ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=10"

  • The Total Economic Impact of ServiceNow Strategic Portfolio Management

    Sponsored by: ServiceNow

    Strategic portfolio management (SPM) allows organizations to gather their enterprise-wide documentation into a single platform for easier access. Forrester Total Economic Impact Study looks at ServiceNow SPM, using real-world use cases and statistics to provide an accurate estimate of the economics you can expect. Read on to learn more.

  • MicroScope – December 2022: Dealing with rising prices

    Sponsored by: MicroScope

    With prices rising, many are looking at what costs to cut – yet in the channel, the opposite might prove for better business. In this issue, read about how to navigate the cost issue, learn about the growing area of security, and learn about how to create a more appealing employment experience to attract talent

  • Computer Weekly – 20 August 2024: A gold medal for Olympic mobile coverage

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we go behind the scenes with Orange, networking partner for the Paris Olympic Games, to discuss the challenges of connecting 120 venues. We talk to a CIO for whom IT accessibility and usability is a very personal concern. And we look at how to keep control of SaaS licensing costs. Read the issue now.

  • Top 10 Nordic IT stories of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    The Nordic region offers the world a melting pot of tech, with its huge traditional industries and world-leading tech startup hubs.  In this eguide, read about the unique mix of features in the Nordic countries that means traditional businesses and consumers are willing to apply new technology to problems big and small.

  • The technological evolution of IT industry leaders: Part two

    Sponsored by: TechTarget ComputerWeekly.com

    Companies leading the technological evolution have gone through changes. This second part of this e-guide explores the technological evolution of SAP, Microsoft and some business analytics vendors throughout the past two decades.

  • Unlocking value in the railway network's data

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the rail industry is working to improve its use of data to deliver bet-ter services to passengers. Is flash the saviour of the storage universe? Our buyer's guide assesses the choices for IT managers. And we examine the failure of the government's Covid-19 contact-tracing app. Read the issue now.

  • Unlocking value in the railway network's data

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the rail industry is working to improve its use of data to deliver bet-ter services to passengers. Is flash the saviour of the storage universe? Our buyer's guide assesses the choices for IT managers. And we examine the failure of the government's Covid-19 contact-tracing app. Read the issue now.

  • Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated

    Sponsored by: TechTarget ComputerWeekly.com

    This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.

  • Computer Weekly – 6 February 2018: How a digital workplace can drive innovation

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at some of the latest tools for the digital workplace and find out how they can improve collaboration and innovation. We ask what lessons the demise of Carillion has for IT outsourcing. And the CIO of retailer River Island tells us how technology is changing the high street in fashion. Read the issue now.

  • Legacy PKI Migration

    Sponsored by: Venafi

    52% of the 2500 participants surveyed by the Ponemon Institute reported that their organizations have poor visibility of apps that rely on Public Key Infrastructure (PKI). Along with exploring that obstacle, this white paper considers other challenges that legacy PKI can pose. To unlock those insights and more, read on.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.