ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=10"

  • Data governance more important now than ever

    Sponsored by: TechTarget ComputerWeekly.com

    As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.

  • GEP Procurement & Supply Chain Tech Trends Report

    Sponsored by: GEP

    As procurement and supply chain leaders continue to navigate customer service challenges while battling macroeconomic struggles, extreme weather conditions, and geopolitical upheavals, many organizations are looking for new ways they can thrive in an uncertain world. Browse this report to learn more.

  • Solving Business Challenges With Data And AI: 5 insights from C-suite leaders

    Sponsored by: Elastic

    As businesses face growing data challenges, integrating real-time data, analytics, and AI can drive revenue, productivity, and resilience. Download this report to discover 5 insights from C-suite leaders on how to solve business challenges with data and AI.

  • Navigating Disruption with Generative AI Strategies

    Sponsored by: Foundever

    Enterprises must adapt to evolving customer expectations and technology disruption. Generative AI offers strategic advantages to help modernize customer experience, optimize operations, and future-proof the business. Download this analyst report to learn how to leverage Generative AI for your CX transformation.

  • CW Europe: December 2016 - February 2017

    Sponsored by: TechTarget ComputerWeekly.com

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

  • Cloud Performance Report: 2022 Edition

    Sponsored by: Cisco ThousandEyes

    In order to understand the state of cloud performance, Cisco Thousand Eyes performed measurements through vantage points connected to Tier 2, Tier 3, as well as cloud backbone networks. This report provides an analysis of the performance and connectivity architectures of the top 3 public cloud providers. Read on to learn more.

  • Identity trends for 2023

    Sponsored by: TechTarget ComputerWeekly.com

    Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.

  • Atlassian Cloud Architecture And Operational Practices

    Sponsored by: Atlassian

    This white paper explores Atlassian's cloud architecture and operational practices, including their use of AWS, availability zones, data backups, and security controls. Read on now to learn how Atlassian ensures tenant separation and data encryption to safeguard customer data in the cloud.

  • What is AWS? The ultimate guide to Amazon Web Services

    Sponsored by: TechTarget Cloud Computing

    What is Amazon Web Services? Find out in TechTarget's guide. Learn about AWS's key services, benefits, pricing, and real-world use cases to see how it drives scalability and innovation. Perfect for anyone looking to expand their cloud strategy.

  • Unified Communication: “It should work as easily as a telephone call!”

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security series explains the security implications of unified communication.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.