ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=20start=10start=10start=20start=30"

  • Cloud migration: What enterprises need to know

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a closer look at what enterprises need to consider to make moving to the cloud as seamless as possible, while sharing some success stories of big name enterprises that have already successfully done it.

  • Fintech : Meet ten financial services disruptors - Part Two

    Sponsored by: TechTarget ComputerWeekly.com

    Whether it's the insurance sector, lending or full service banking there are a number of companies, often still in their early stages, disrupting the financial services sector. But who are these companies, where do they come from, and what drives them? In this e-guide, the second in a series, we meet another ten of them.

  • Computer Weekly – 25 July 2023: Getting comfortable with data

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the head of IT at furniture retailer DFS about building trust in data. The vulnerabilities in MOVEit software continue to attract new victims – we assess the impact of the breaches. And we find out how online investigators are trawling social media to gather evidence of war crimes. Read the issue now.

  • The Definitive Guide To OKRs

    Sponsored by: Atlassian

    This guide provides tips for leaders on setting impactful OKRs, scoring to track progress, and adjusting goals as needed. It warns against pitfalls like too many objectives, rigid cascading, and linking pay to OKRs. Dive into the guide.

  • Computer Weekly - 10 September 2024: The flight to data success

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how Manchester Airport Group has set course to become the world's most intelligent airport through its data-led approach. We also look at failings of AI initiatives as the tech hits roadblocks, as well as take a peak at what support networks are available to those new in the CISO role. Read the issue now.

  • Computer Weekly – 12 June 2018: How National Geographic uses tech to captivate its audience

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the world-famous National Geographic magazine is adapting to the digital age and using technology to better engage its audience. We ask what Microsoft's $7.6bn acquisition of GitHub means for the open source community. And our latest buyer's guide looks at developer tools. Read the issue now.

  • ESG Securing Hybrid Cloud Environments

    Sponsored by: Red Hat

    Hybrid cloud environments introduce complex security challenges as organizations migrate to the cloud. This Enterprise Strategy Group (ESG) white paper explores best practices for securing the full stack, automating security controls, and leveraging tools to improve security and compliance at scale. Read now to learn more.

  • Supercharging Employee Growth and Development

    Sponsored by: ServiceNow

    Business Leaders are finding that focusing on skills, rather than jobs or degrees, strengthens your workforce with modern data and insights. This paper presents four ways that a skills-powered approach can supercharge employee growth and development.

  • How to Capitalize on the Edge Computing Opportunity

    Sponsored by: Schneider Electric

    Discover how managed service providers and value-added resellers can leverage edge computing. Learn best practices, essential capabilities, tools, and partnership-building in this white paper to expand your edge expertise and presence.

  • 2024 State of Application Security Report

    Sponsored by: CrowdStrike

    8 of the top 10 data breaches of 2023 were related to application attack surfaces. This report synthesizes data collected from a survey of application security professionals to reflect the current state of application security, condensing the findings into 8 key takeaways. Download now to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.