ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=10start=10start=20"

  • Computer Weekly – 9 April 2019: Using data science at Sainsbury's

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to retailer Sainsbury's about its data science strategy and how it helps the firm better understand customers. We take a detailed look at the evolution of the business intelligence market. And we find out how simulated disaster management can tackle the security skills gap. Read the issue now.

  • Preventing identity theft in a data breach

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.

  • Understanding Intent Data

    Sponsored by: TechTarget

    Intent data can help you prioritize accounts by capturing prospect activities and gauging the level of purchase interest. In this e-book, “Understanding Intent Data,” we detail the basics of intent data and show how to incorporate it into your marketing strategy.

  • MicroScope – March 2020: Making life simpler for the channel

    Sponsored by: MicroScope

    In this issue, read about how Dell is continuing on its mission to make life easier for partners by introducing improved tools, and we take a closer look at how cloud, cyber security and 5G are set to dominate over the course of 2020

  • WakeMed Mobile Platform Creates Seamless Patient Experience

    Sponsored by: Gozio Health

    Read about how a mobile platform that established a digital handholding experience for patients and visitors quickly became a vital tool for WakeMed Health & Hospitals.

  • Computer Weekly - 8 June 2021: The jobseekers turning to cyber crime in the pandemic

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, security researchers say that people left unemployed by the pandemic are turning to cyber crime – we find out why. We examine the confluence of distributed cloud and edge computing technologies. And controversial uses of facial recognition technology come under further scrutiny. Read the issue now.

  • September ezine: Thinking digital in the world of storage

    Sponsored by: MicroScope

    The full report of the recent MicroScope storage roundtable which discusses how cloud and GDPR has changed the industry

  • September ezine: Thinking digital in the world of storage

    Sponsored by: MicroScope

    The full report of the recent MicroScope storage roundtable discussing how cloud and GDPR has changed the industry

  • Securing Privileged Access in Transformative Times

    Sponsored by: CyberArk

    In this piece on PAM’s evolution, you’ll find stories, insights and best practices from Barak Feldman, Senior Vice President, Privileged Access Management and Identity Security, CyberArk. Download it today, and learn how to secure high-risk access in two fast-emerging PAM use cases: Cloud environments and Operational technology (OT).

  • Deliver Better HR Services Faster With Now Assist

    Sponsored by: ServiceNow and DXC

    Unlock the power of GenAI to streamline HR service delivery and accelerate app development. Now Assist from ServiceNow empowers employees with self-service, boosts HR agent productivity, and simplifies custom app creation. Read this guide to discover how GenAI can transform your HR and development workflows.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.