Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=10start=20"
-
Preparing for S/4Hana upgrade
Sponsored by: Livingstone GroupS/4Hana offers organisations many benefits in terms of speed and the ability to run the latest, cloud-ready platform. But the upgrade can be costly. This E-Guide looks at how IT decision makers can get ready for S/4Hana upgrade projects, while keeping their existing ECC systems running, and the upgrade options available to them.
-
Can’t Choose Between Public And Private Cloud? You Don’t Have To With IaaS
Sponsored by: FCNIn this Forrester report, discover why organizations are adopting infrastructure-as-a-service (IaaS), the features they consider essential in an IaaS model, and the business benefits that such a model can deliver.
-
Cultivate a PMM Capability that Helps Optimize Your Entire GTM
Sponsored by: TechTargetHow can your organization transform “alignment” from a buzzword into a performance-driving strategy? Review this TechTarget e-book to unlock Forrester’s framework for planning and activating GTM alignment.
-
Zscaler ThreatLabz 2024 Phishing Report
Sponsored by: ZscalerZscaler's Phishing Report analyzes the surge in AI-fueled phishing attacks, including vishing, deepfakes, and browser-in-the-browser tactics. Discover the latest phishing trends, targeted industries, and effective security measures to stay ahead of this evolving threat. Read the full report.
-
How Citrix Leverages Intent & Multi-Layered Engagement to Innovate in Its ABM Programs
Sponsored by: TechTargetIn this e-book, global digital workspace leader Citrix shares how it is winning with strategies that identify, influence and deliver opportunities from existing and net-new ABM accounts. Download your copy to learn more.
-
TMS Technology Value Matrix 2023
Sponsored by: Blue YonderAs the TMS market continues to evolve, it can be difficult for supply chain organizations to navigate the various vendors, and many can have trouble finding a solution that fits their unique needs. Access this report to discover the industry’s top vendors and how they stack up.
-
Identifying Use Cases For Ai In Procurement Turning Vision Into Reality
Sponsored by: GEPBy 2026, Gartner predicts, over 80% of businesses will have leveraged generative AI–powered application program interfaces or models. So, what will this massive adoption mean for procurement organizations? In this 15-page white paper, discover AI use cases for procurement leaders.
-
Why Enterprise Linux is Becoming More Relevant for Hybrid Cloud
Sponsored by: Red HatTap into this IDC report to discover 5 reasons why Enterprise Linux is becoming more relevant for hybrid cloud.
-
Virtual currencies and their potential role in cyber crime
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.
-
Anatomy Of Identity Based Attacks
Sponsored by: Okta74% of all breaches involve some form of human factor, whether it be error, credential theft, or social engineering. This white paper looks at the growing threats impacting organizations today, and how Okta can play a role in threat protection, detection, and response, before, during, and after the point of authentication.Read on to learn more.