ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=10"

  • The Essential Guide to XDR

    Sponsored by: Palo Alto Networks

    Extended detection and response (XDR) is one of the main solutions cybersecurity professionals have turned to deal with the rise in cyberthreats. Read on for a comprehensive breakdown of XDR, what it is, how it works, and what you can do to get the most out of your XDR tools.

  • The Intelligent CX Revolution: How AI is Changing the Game

    Sponsored by: Sprinklr

    Explore how AI and generative AI are reshaping the customer experience. Access this white paper to learn how enterprises can harness AI to drive impactful customer and business outcomes, address workforce challenges, and partner with the right technology provider.

  • Making the Move to S/4HANA and Cloud-Based ERP

    Sponsored by: Microsoft, Intel, SAP

    In this expert e-guide, we explore how to future-proof your ERP system and increase its flexibility. Learn about the migration to S/4HANA as well as the pros and cons of private vs. public vs. hybrid cloud-based ERP deployments.

  • Guide to business continuity planning during COVID-19

    Sponsored by: TechTarget ComputerWeekly.com

    As COVID-19 continues to spread, companies need to evaluate their ability to conduct business as usual during this time. Inside this comprehensive guide, we share best practices on how to defend your business against disruption, identify key business areas at risk and respond to business continuity planning challenges.

  • Fixing Employee Collaboration in the Era of Distributed Teams

    Sponsored by: Atlassian

    This Analyst Report examines how the rise of hybrid work has led to collaboration tool sprawl and information silos, hindering cross-functional teamwork. The report outlines how consolidating on a unified platform like Atlassian can help organizations boost productivity and collaboration. Read the full report to learn more.

  • November ezine: Peer-to-peer lending

    Sponsored by: MicroScope

    Credit always matters in the channel and peer-to-peer lending might just be the alternative some have been looking for

  • The Total Economic Impact™ Of Sedex

    Sponsored by: Sedex

    As rules and requirements for customers, partners, and investors continue to force firms to reshape their supply chains to stay resilient, many companies are looking for effective ways to stay competitive. However, maintaining sustainable, transparent, and credible supply chains is easier said than done. Dig into this report to learn more.

  • Computer Weekly – 8 January 2019: Technology innovation in music

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we visit the first hackathon at Abbey Road Studios, once home to The Beatles, to find out how tech startups hope to revolutionise music creation. Our latest buyer's guide looks at perimeterless network security. And we look ahead to the key CIO skills and jobs trends for 2019. Read the issue now.

  • Computer Weekly – 19 December 2017: Navigating through digital change

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, IT leaders share the lessons learned and discuss best practice in digital transformation. We find out how SAP is addressing customer concerns about its indirect licensing policies. And we assess whether SME IT suppliers are making headway in selling to government CIOs. Read the issue now.

  • Preventing identity theft in a data breach

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.