ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=10"

  • The Modern IT Professional’s Guide To Shadow IT

    Sponsored by: Auvik Networks, Inc.

    Unapproved tools put organizations at risk. Learn how to govern, identify, protect, detect, respond, and recover from shadow IT. Read this white paper for a comprehensive plan to shed light on the shadows – also inside, find a self-assessment quiz that helps you determine your risk factor.

  • Middle East focus: Moving to the cloud

    Sponsored by: TechTarget ComputerWeekly.com

    According to Gartner, companies in the Middle East are set to spend almost $2bn on moving systems to the cloud by 2020, so it is important they understand the challenges to avoid wasting money.

  • E911: The Ultimate Guide To Compliance

    Sponsored by: Sinch

    Today, 80% of 911 calls are made from mobile devices, it can be difficult to pinpoint a caller’s location. So, how can emergency services revamp their telecom while ensuring their compliance with new E911 laws? Access this white paper to learn more.

  • Healthcare’s Digital Pulse: Elevating Precision in Inventory Management

    Sponsored by: Zebra Technologies

    Explore how hospitals use RFID, barcodes, and location tracking to revolutionize inventory management and patient care. Discover the advantages, obstacles, and strategies healthcare leaders employ to enhance materials management in the full Hospital Vision Study.

  • A Computer Weekly buyer's guide to the future of collaboration

    Sponsored by: TechTarget ComputerWeekly.com

    Businesses are using collaborative software to operate in revolutionary new ways. In this 13-page buyer's guide, Computer Weekly looks at its potential negatives, the improved agility it provides and assesses Chromebooks as collaboration clients

  • The long march of S/4 Hana

    Sponsored by: TechTarget ComputerWeekly.com

    S/4 Hana, the ERP system built on SAP's in-memory, columnar database Hana has been on a long march through the enterprise since its launch in February 2013. In this e-guide, we discuss the pros and cons of upgrading to S/4 Hana, what the future has in store for the system and how its users are feeling about C/4 Hana integration.

  • 10 Steps to Enhance the Agility, Security and Performance of Active Directory

    Sponsored by: One Identity

    Microsoft Active Directory (AD) and Azure AD (AAD) bring organization and standards to how identity and account data is managed and stored. One Identity Active Roles unifies your AD and AAD environments and enables identity and account data to be managed with agility, security and speed. Read on to learn more.

  • Navigating Liquid Cooling Architectures for Data Centers with AI Workloads

    Sponsored by: Schneider Electric

    This white paper provides guidance on selecting the appropriate liquid cooling architecture for data centers with AI workloads. It covers the key elements of a liquid cooling system, including heat capture, coolant distribution units, and heat rejection methods. Read on to learn how to choose the best liquid cooling solution for your needs.

  • Security Think Tank Christmas Special - The most important lessons of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    In this special edition of Computer Weekly Security Think Tank, we asked our panel of cyber security experts to share their thoughts on the most impactful cyber lessons they've learned during 2021. Download this E-Guide and find out more about their valuable inputs and guidance.

  • How AI is Impacting Healthcare

    Sponsored by: XtelligentMedia Healthcare

    President Biden's executive order focuses on the importance of secure and reliable Artificial Intelligence (AI) in various sectors, including healthcare.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.