Search Results for "Ovum Researchstart=30start=20start=10start=20start=10start=10start=20start=30"
-
Computer Weekly – 19 July 2016
Sponsored by: TechTarget ComputerWeekly.comIn this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.
-
CW Benelux August 2019: Dutch academic seeks the personality behind the cyber criminal
Sponsored by: TechTarget ComputerWeekly.comThere is at least one person behind every cyber attack, but beyond that insight, very little known is about them. Rutger Leukfeldt, senior researcher on cyber crime at the Netherlands Institute for the Study of Crime and Law Enforcement, has been trying to get inside the minds of hackers.
-
What Human Behavior Can Teach Us About Effective B2B Marketing
Sponsored by: BrightTALK by TechTargetDue to a variety of new technology and tools, marketing teams now have 360-degree view and insights into their audience. However, those insights mean nothing if you don’t know to utilize them to efficiently drive growth. So, how can you best decode audience behavior? Read through this guide to learn more.
-
Mobile World Congress 2019: The year 5G use cases got real
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we will examine some of the bigger themes that emerged over the course of Mobile World Congress 2019 - which now attracts over 100,000 people every year.
-
CW APAC - February 2022: Trend Watch - enterprise 5G
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, focused on enterprise 5G in the Asia-Pacific region, Computer Weekly looks at what the technology means for enterprises across the region.
-
Jargon Buster Guide to Voice over IP (VoIP)
Sponsored by: TechTarget ComputerWeekly.comIn this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
-
The Public Sector’s Guide to Privilege
Sponsored by: CyberFOXCybercriminals target public institutions like schools and government agencies due to sensitive data and weak security. This e-book examines cybersecurity oversights, attack impacts, and how privileged access and password management solutions can reduce risks. Read the full e-book to learn how you can strengthen your organization's defenses.
-
How Van Horn Improves Employee Training By 20%
Sponsored by: T-Mobile for Business“Amaze Our Customers”: This is Van Horn Automotive Group’s philosophy. To continue fulfilling that mission, Van Horn set out to transform its communications system. This case study maps out the journey, breaking down how, in addition to modernizing its communications, Van Horn improved its onboarding training. Read on for more details.
-
Physician Burnout and Moral Injury: Addressing a Growing Crisis
Sponsored by: Quality ReviewsIt’s no secret that it’s hard to be a physician in the US. A growing physician crisis can be attributed to burnout and its effects, but many healthcare organizations fail to recognize the role of moral injury as well. In this white paper, discover how moral injury differs from burnout and learn how you can combat it with effective solutions.
-
Security Think Tank Christmas Special - The most important lessons of 2021
Sponsored by: TechTarget ComputerWeekly.comIn this special edition of Computer Weekly Security Think Tank, we asked our panel of cyber security experts to share their thoughts on the most impactful cyber lessons they've learned during 2021. Download this E-Guide and find out more about their valuable inputs and guidance.