ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=10start=20"

  • Assessing The Value Of HR Tech: Going Beyond The Numbers

    Sponsored by: Sage

    This white paper explores how to assess the true value of HR technology, beyond just cost savings. It outlines quantifiable and non-quantifiable benefits, and how to get the most from your HR tech investment. Read the full white paper to learn how to realize continual value from your HR cloud platform.

  • Fit for a Secure Future

    Sponsored by: Vodafone

    This cybersecurity report details how you can become a Fit for the Future (FFTF) business; organizations that take a very different approach to security challenges, resulting in increased revenue, ESG commitment, and reduced impact from cybersecurity attacks. Explore the report here.

  • Focus: Enterprise Mobility Management

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will explore exactly enterprise mobility management, looking in-depth at some of the key trends and developments in the world of enterprise mobility, as well as keeping a watchful eye on cybersecurity.

  • Endpoint security: Hybrid work changes the game

    Sponsored by: TechTarget ComputerWeekly.com

    A scant few years ago, you could be forgiven for thinking that endpoint security was a relatively simple affair, even though it was not.  In this E-Guide, we consider some of the most pressing issues facing the hybrid workplace in terms of endpoint security.

  • Computer Weekly – 25 June 2019: Saving bees with the internet of things

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how internet of things technologies and "smart hives" are helping bee conservation. We examine Facebook's new digital currency, Libra, and analyse its pros and cons. And we look at how IT leaders are rising to the challenge of delivering ethics and sustainability in tech. Read the issue now.

  • Smarter, connected meeting spaces

    Sponsored by: TechTarget ComputerWeekly.com

    This report from analyst group Quocirca explains how to use smart technology to make meetings more effective.

  • SAN block access storage in the age of cloud and hyper-converged

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.

  • SAN block access storage in the age of cloud and hyper-converged

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.

  • The Business Transformation Management Playbook: Combining Business And IT For Successful Transformation

    Sponsored by: SAP

    The business transformation playbook explores a 5-stage methodology for successful business transformation. Discover your current state, analyze dependencies, design your target state, implement changes, and operate your transformed business. Read the full e-book to learn how to drive effective business transformation.

  • Focus: Securing for the future

    Sponsored by: TechTarget ComputerWeekly.com

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.