ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=10start=20"

  • A Computer Weekly eGuide to Workspaces

    Sponsored by: TechTarget ComputerWeekly.com

    In this eGuide we focus on all thing's workspace related. We dive into Google's new privacy settings, how the landscape of workspaces will look when the world of work fully returns and Google's new G Suite workspace overhaul.

  • APAC career guide: Becoming a cyber security pro

    Sponsored by: TechTarget ComputerWeekly.com

    Once the sole domain of highly technical geeks poring over security logs to look for signs of hackers lurking in their networks, cyber security has become more multi-dimensional and varied across specialisations, organisations and industries. In this e-guide, learn what it takes to become a successful cyber security pro in APAC.

  • Catalyst For Change: How Technology Leaders Can Be Key Allies For Customer And Employee Experience Initiatives

    Sponsored by: ServiceNow

    Discover in this e-book how your IT team can help your organization deliver a cohesive and accelerated customer experience.

  • The Rise of Globally Distributed Teams

    Sponsored by: Remote

    Despite continued controversy over remote work, many teams are now looking to another slowly rising trend: distributed work. Organizations are now moving beyond international borders to improve costs, diversity, retention, and more to ensure productivity and employee satisfaction. Dig into this report to learn more.

  • Unified Communication: “It should work as easily as a telephone call!”

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security series explains the security implications of unified communication.

  • Privileged Access Management Maturity in the Cloud Era

    Sponsored by: Saviynt

    It’s estimated that 80% of data breaches involve privilege misuse or compromise. Gartner lists Privileged Access Management (PAM) as a critical infrastructure service and a high-priority cyber defense capability. Read this white paper to learn more.

  • Protect the Endpoint: Threats, Virtualization, Questions, Backup, and More

    Sponsored by: Carbon Black

    Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. Learn from industry experts and get up to speed on achieving the best endpoint protection.

  • CW Middle East ezine April 2018

    Sponsored by: TechTarget ComputerWeekly.com

    The Middle East region is on a path, or even fast track, to becoming a global digital hub. But any country or region heading in this direction will have some fundamentals to get right.

  • Microsoft Teams Phone PSTN Buyer’s Guide

    Sponsored by: 8x8

    Download this concise e-book for a buyer’s guide that describes Microsoft Teams’ PSTN integration choices. You will learn about the advantages and drawbacks of each without drowning in the details or losing sight of your original goal—to add voice service to Microsoft Teams.

  • Atlassian Cloud Data Protection

    Sponsored by: Atlassian

    In most industries, the most important asset to an organization is data. The problem is that data is becoming more challenging to protect and secure, and this is no different in the cloud. If your data isn’t protected correctly, the cost of a breach can take down an entire organization. So, what are the challenges? Read on to find out more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.