ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=10start=20"

  • Computer Weekly – 6 February 2018: How a digital workplace can drive innovation

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at some of the latest tools for the digital workplace and find out how they can improve collaboration and innovation. We ask what lessons the demise of Carillion has for IT outsourcing. And the CIO of retailer River Island tells us how technology is changing the high street in fashion. Read the issue now.

  • Computer Weekly – 6 June 2017: General Election 2017: Who gets the tech vote?

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of Computer Weekly, as the UK votes for a new government, examine the digital policies in the manifestos of the Conservative, Labour and Liberal Democrat parties, and hear what IT trade body TechUK would like to see for the tech sector from the next administration. Read the issue now.

  • CW Europe - March-May 2022: Luxembourg sees big role in global fintech market

    Sponsored by: TechTarget ComputerWeekly.com

    Read about Luxembourg's aim to play a larger role in the rapidly growing global financial technology market. Also find out how a Siri-like digital assistant will automate the completion of government service requests in Estonia.

  • CW Europe - June-August 2020: 5G rush in Russia

    Sponsored by: TechTarget ComputerWeekly.com

    Russian mobile operators are pooling their resources to help them overcome the technical challenges of creating 5G networks. Also read how Swedbank is rebuilding its anti-money laundering systems after a damning report, and how a public-private partnership in the Netherlands is helping to combat cyber fraudsters.

  • CW Europe - June-August 2020: 5G rush in Russia

    Sponsored by: TechTarget ComputerWeekly.com

    Russian mobile operators are pooling their resources to help them overcome the technical challenges of creating 5G networks. Also read how Swedbank is rebuilding its anti-money laundering systems after a damning report, and how a public-private partnership in the Netherlands is helping to combat cyber fraudsters.

  • MicroScope – March 2021: The 5G opportunity

    Sponsored by: MicroScope

    Experts predict that 2021 is meant to be the year of 5G, but what does that mean for the channel? In this issue, discover what 5G technology could bring to the reseller community, learn about how smart buildings are influencing the way we live, and discover how remote working has changed the way we work

  • Computer Weekly – 28 March 2023: Is TikTok really a security threat to your business?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, with the UK government becoming the latest administration to ban TikTok, we ask whether the controversial social media app is really a security threat to enterprises. Read the issue now.

  • Computer Weekly – 30 August 2016: Get protected

    Sponsored by: TechTarget ComputerWeekly.com

    It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.

  • Accelerate growth and improve competitiveness

    Sponsored by: AWS

    It’s time to achieve your own AI success. Grab a copy of this e-book to browse a compendium of case studies in which 10 leading companies are successfully using AI with AWS to drive innovation, improve the customer experience, boost application performance, and automate business operations.

  • A Computer Weekly buyer's guide to zero-trust security

    Sponsored by: TechTarget ComputerWeekly.com

    Zero trust is a conceptual architectural model that uses microperimeters and microsegmentation to secure corporate networks. In this 12-page buyer's guide, Computer Weekly looks at why trust should be considered a security risk and the need for additional authentication strategies to have an appropriate level of security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.