ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=20start=10start=10start=20start=30"

  • Computer Weekly – 14 November 2023: The UK AI Safety Summit – what did it achieve?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look back at the UK government's AI Safety Summit and assess what it achieved – and what it didn't. Our latest buyer's guide examines the future of business software and modernising legacy applications. And we find out how the UK PSTI Act aims to protect your smart devices. Read the issue now.

  • CeBIT: 26-30 March 2015

    Sponsored by: CeBIT

    Be our guest at CeBIT 2015 - Visit the world's leading IT trade show and conference for professionals.

  • Build a Better Webinar: Post-Event Best Practices

    Sponsored by: BrightTALK by TechTarget

    Download this e-book for expert advice on how to realize the full potential of your webinars. From enabling your sales team to follow-up on activity to creating derivative content for future campaigns, you'll discover how you can make the most of the engagement you have now and set you up to maximize on-demand engagement in the future.

  • 8 Ways to Transform Your Supply Chain Ebook

    Sponsored by: Alteryx

    How confident are you in your latest inventory forecast? You can overcome disruption, generate revenue and create growth with AI-powered analytics – and lead your supply chain efforts with both confidence and agility. Read this e-book to learn about 8 ways you can innovate and improve your supply chain.

  • Public Sector Leaders Discuss IT Infrastructure

    Sponsored by: Red Hat

    In this e-book, join PeerSpot members who work in government and the public sector as they discuss why they selected Red Hat Enterprise Linux (RHEL) as their Linux distribution of choice.

  • Manchester United praised for swift response to cyber attack

    Sponsored by: TechTarget ComputerWeekly.com

    The Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.

  • 2022 UKI Media Consumption Study: Characteristics of the Buying Team

    Sponsored by: TechTarget ComputerWeekly.com

    In this infographic, we share insights on the ever-growing IT buying team and give practical advice on how to engage the whole purchasing team throughout a complicated buying process.

  • Harden Your Systems Using CIS and DISA STIGs Benchmarks

    Sponsored by: Progress Software Corporation

    Organizations face the challenge of securing complex multi-cloud environments. Chef Compliance automates system hardening and compliance with CIS Benchmarks and DISA STIGs. This guide illustrates how you can use Chef Compliance to achieve system hardening by mapping CIS and DISA benchmark standards to automated controls. Dive into the guide here.

  • Unified Communication: “It should work as easily as a telephone call!”

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security series explains the security implications of unified communication.

  • Build a Better Webinar: Developing Your Brand

    Sponsored by: BrightTALK by TechTarget

    From landing pages to email promotions, learn how to develop a strong webinar brand that helps share your message and builds excitement across your audience.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.