ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=10"

  • New tech on the block: Planning for blockchain in the retail and consumer packaged goods industries

    Sponsored by: TechTarget ComputerWeekly.com

    This research from Deloitte identifies the areas with the biggest immediate opportunity for retail and consumer packaged goods (CPG) businesses looking to invest in blockchain technology.

  • Tools Designed for Security Could Be Your Biggest Security Threat

    Sponsored by: Tanium

    How can your organization’s cybersecurity tools become cybersecurity threats? Through tool sprawl. In this white paper, learn how to tackle that issue in three steps.

  • Mapping and Reducing Scope 3 Emissions

    Sponsored by: GEP

    Today, procurement organizations face a handful of pressing sustainability issues, the most formidable of them being scope 3 emissions. So, how can companies best address these problems and build an effective, end-to-end emissions reduction framework? Browse this white paper to learn more.

  • A Computer Weekly buyer's guide to edge datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    Edge datacentres seem set for a post-pandemic resurgence. In this 17-page buyer's guide, Computer Weekly looks at what makes them such an appealing option, the role infrastructure as code has to play and what's driving company adoption.

  • Pure Storage Evergreen Portfolio: Storage for the Digital Era

    Sponsored by: Pure Storage

    As enterprises undertake digital transformation, their storage infrastructure must evolve. This IDC white paper examines how Pure Storage's Evergreen portfolio helps organizations modernize their IT with flexible, as-a-service storage solutions that enable agility, scalability, and sustainability. Read the full report to learn more.

  • Trouble at your door: targeted cyber attacks in the UK and Europe

    Sponsored by: TechTarget ComputerWeekly.com

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • CW APAC: Trend Watch: Cloud networking

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology's advantages and how networking and security might evolve in the future.

  • CW EMEA: Investing in the future

    Sponsored by: TechTarget ComputerWeekly.com

    There is a lot of uncertainty in the world right now, and businesses might be forgiven for taking a cautious approach to their planning. But one thing is certain, and that is that oil-rich countries in the Middle East will continue to invest heavily in diversifying their economies.

  • Computer Weekly - 15 March 2022: How the tech sector is supporting Ukraine

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.

  • Enabling autonomous identity security as a modern approach to IGA

    Sponsored by: SailPoint Technologies

    Managing identities was simpler when you only had to worry about user profiles, but What if machine identities could manage themselves, without presenting a risk for security? Autonomous identity security combines automation with IGA practices to create a system that manages access without the need for human input. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.