ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10"

  • Preparing for S/4Hana upgrade

    Sponsored by: Livingstone Group

    S/4Hana offers organisations many benefits in terms of speed and the ability to run the latest, cloud-ready platform. But the upgrade can be costly. This E-Guide looks at how IT decision makers can get ready for S/4Hana upgrade projects, while keeping their existing ECC systems running, and the upgrade options available to them.

  • How virtual desktops simplify end user computing during lockdown

    Sponsored by: TechTarget ComputerWeekly.com

    While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.

  • CW ANZ – February 2019: Home in on storage minutiae

    Sponsored by: TechTarget ComputerWeekly.com

    In this edition of CW ANZ, we look at how organisations are using storage analytics to manage their storage footprint and what suppliers are doing to help enterprises get the most of out of the technology.

  • CW APAC: Trend Watch - Internet of Things

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how APAC firms are putting the internet of things to good use in an increasingly connected world, yet technology integration and security concerns are holding back widespread adoption.

  • The 5-step generative AI value playbook

    Sponsored by: Domino

    Learn the 5 key steps to unlock the value of generative AI for your organization. Discover strategies to drive innovation, enable collaboration, operationalize AI, and more. Read the full eBook to get started.

  • Jargon Buster Guide to Voice over IP (VoIP)

    Sponsored by: TechTarget ComputerWeekly.com

    In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.

  • AI tools for software developers: Part Two

    Sponsored by: TechTarget ComputerWeekly.com

    The Computer Weekly Developer Network is in the engine room, covered in grease and looking for Artificial Intelligence (AI) tools for software application developers to use. With so much AI power in development and so many new neural network brains to build for our applications, how should programmers 'kit out' their AI toolbox?

  • Computer Weekly – 5 March 2019: Modernising IT at the Bank of England

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the Bank of England as it starts the modernisation programme for its core system. We look at the rise of DevSecOps and how it can help deal with increasingly complex security threats. And we examine the different approaches to storage for structured and unstructured data. Read the issue now.

  • The Secure Access Maturity Model

    Sponsored by: StrongDM

    In order to provide an action-oriented approach to reducing the threat posed by all of those credentials, StrongDM built the Secure Access Maturity Model (SAMM).Download this white paper to unlock the full model and use it as a framework to evaluate your identity security systems, and guide you toward secure access maturity.

  • The Hidden Costs of Downtime

    Sponsored by: Splunk

    Downtime and service degradation create a cascade of consequences, costing Global 2000 companies $400B annually. Learn how the most resilient organizations set themselves apart from the rest and Splunk’s recommendations for deterring downtime in this first-of-its-kind report in partnership with Oxford Economics.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.