ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=20start=10start=10start=20start=30"

  • CW APAC – Trend Watch: Modernising security operations

    Sponsored by: TechTarget ComputerWeekly.com

    Organisations everywhere know the risks of cyber security complacency. In this handbook, focused on modernising security operations in the Asia-Pacific region, Computer Weekly looks at how Australia is bolstering its defences, Splunk and Cisco’s integration, and Palo Alto Networks’ “precision AI”.

  • Computer Weekly: The Most Influential People in UK IT

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal the 7th annual UKtech50 – our list of the 50 most influential people in UK IT. And we talk to this year's winner, ARM CEO Simon Segars, about the prospects for the UK tech sector after the uncertainty caused by the Brexit referendum vote. Read the issue now.

  • Using digital twins to cut costs and improve safety at Shell

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.

  • Prioritizing 5G for Healthcare SMBs

    Sponsored by: T-Mobile for Business

    One out of four healthcare SMBs said that 5G is a top 3 technology and health IT initiative that will impact healthcare over the next five years. Planning and investing in 5G will provide many benefits to the healthcare industry, but 5G comes with challenges that can be carefully navigated with the right partners.

  • Why Your Digital Transformation Problem Is A Connection Problem In Disguise

    Sponsored by: Software AG

    Digital transformation often fails due to a lack of connectivity between data, applications, and processes. This white paper explores how to build a truly connected enterprise with integrated applications, streamlined processes, and connected IoT devices to drive successful digital transformation. Read the white paper to access DX success.

  • Ultimate Guide to Zero-Trust Security

    Sponsored by: Trustmarque Solutions Ltd.

    Read this custom TechTarget eGuide to access tips on implementing zero-trust security, including best practices and insights into the top challenges organizations typically face when adopting a zero-trust model.

  • A Computer Weekly buyer's guide to Threat Management

    Sponsored by: TechTarget ComputerWeekly.com

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

  • CIO Trends #9

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, take a look at some of our most popular articles on issues faced by IT decision-makers, such as the rise in IT buying decisions from outside the IT department, the importance of ethics in technology, and a look at how the Department for the Environment, Food and Rural Affairs is preparing its IT for the challenges of Brexit.

  • The Director's Guide to Observability: Leveraging OpenTelemetry in Complex Systems

    Sponsored by: Honeycomb

    For a 13-page guide to observability in complex systems, review this white paper, which explores 3 layers of observability, observability workflows, and more.

  • Fraud management: A perennial business issue

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.