ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=20start=10start=10start=20start=30"

  • Public Sector Leaders Discuss IT Infrastructure

    Sponsored by: Red Hat

    In this e-book, join PeerSpot members who work in government and the public sector as they discuss why they selected Red Hat Enterprise Linux (RHEL) as their Linux distribution of choice.

  • 2022 UKI Media Consumption Study: Characteristics of the Buying Team

    Sponsored by: TechTarget ComputerWeekly.com

    In this infographic, we share insights on the ever-growing IT buying team and give practical advice on how to engage the whole purchasing team throughout a complicated buying process.

  • Manchester United praised for swift response to cyber attack

    Sponsored by: TechTarget ComputerWeekly.com

    The Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.

  • The Intelligent Enterprise: A Tech Blueprint For The C-Suite

    Sponsored by: Flexera Software

    As digital complexity grows, lack of IT visibility can lead to costly breaches and unplanned expenses. Learn how to secure remote access, build user trust, and create a future-proof technology strategy in this eBook.

  • Unified Communication: “It should work as easily as a telephone call!”

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security series explains the security implications of unified communication.

  • Build a Better Webinar: Developing Your Brand

    Sponsored by: BrightTALK by TechTarget

    From landing pages to email promotions, learn how to develop a strong webinar brand that helps share your message and builds excitement across your audience.

  • AI in Fraud Management: Uses cases, benefits and challenges

    Sponsored by: TechTarget ComputerWeekly.com

    AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.

  • CW Buyer's Guide to Emerging technology

    Sponsored by: TechTarget ComputerWeekly.com

    The way we work is changing with the exponential emergence of new technology. In this 15-page buyer's guide, Computer Weekly looks at the potential of DNA storage, how we can benefit from quantum computing in the future and the role of software in business development.

  • How Russia's war in Ukraine is changing the cybersecurity game and why that matters

    Sponsored by: TechTarget ComputerWeekly.com

    The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.

  • The IT Leader's Guide To Optimizing Your Cloud Budget:

    Sponsored by: Google Cloud & AMD

    In “The IT Leader's Guide to Optimizing Your Cloud Budget” by Google Cloud and AMD, discover 3 best practices and find out how CPU technology can factor into cost savings.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.