ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=30"

  • Benelux: New skills in a digital world

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at some of the technologies being adopted in the Benelux region. This gives a taste of what is in demand. Read about how Dutch organisations and the Netherlands in general are witnessing the rise of technologies like virtual reality, no-code programming platforms, smart neighbourhood, as well as fintech.

  • Computer Weekly – 2 August 2022: How to create a datacentre capacity plan

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, planning datacentre capacity is a growing challenge – we ask the experts for the latest best practice. Victims of the Post Office IT scandal explain why they think they were targeted for speaking out. And we look at the digital skills gap in retail and find out how employers can source talent. Read the issue now.

  • Computer Weekly - 4 May 2021: How KFC put digital on the menu

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how fast-food chain KFC turned to digital to survive the pandemic. Our latest buyer's guide looks at technologies to improve office productivity for home workers. And we assess the growing problem of electronic waste and how to tackle it. Read the issue now.

  • The 5G for Business Guidebook

    Sponsored by: Cradlepoint

    Besides being able to download Netflix movies faster, should you really care about 5G? Download this e-guide to learn about the basics of 5G, how it differs from 4G, why you should care and how to find the best 5G fit for your organization.

  • Top 10 business applications stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    The steady incursion of artificial intelligence (AI) into enterprise software was a major theme behind Computer Weekly's indepth stories in this area in 2019. Human versus machine is the opposition that looms over much of the coverage here. Here are Computer Weekly's top 10 business applications stories of 2019.

  • CW Europe - June-August 2020: 5G rush in Russia

    Sponsored by: TechTarget ComputerWeekly.com

    Russian mobile operators are pooling their resources to help them overcome the technical challenges of creating 5G networks. Also read how Swedbank is rebuilding its anti-money laundering systems after a damning report, and how a public-private partnership in the Netherlands is helping to combat cyber fraudsters.

  • CW Europe - June-August 2020: 5G rush in Russia

    Sponsored by: TechTarget ComputerWeekly.com

    Russian mobile operators are pooling their resources to help them overcome the technical challenges of creating 5G networks. Also read how Swedbank is rebuilding its anti-money laundering systems after a damning report, and how a public-private partnership in the Netherlands is helping to combat cyber fraudsters.

  • Transform your Applications

    Sponsored by: Red Hat

    Azure Red Hat OpenShift provides a unified, cloud-based application platform to modernize apps, build cloud-native services, and accelerate innovation. Unlock new business possibilities with expert-managed hybrid cloud services. Read the full white paper to learn more.

  • CW APAC, February 2021: Buyer’s guide to data management

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on data management in the Asia-Pacific region, Computer Weekly looks at best practices, Alibaba’s use of databases, the role of artificial intelligence in handling information and data trends to look out for

  • A Computer Weekly buyer's guide to Threat Management

    Sponsored by: TechTarget ComputerWeekly.com

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.