ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30"

  • A Computer Weekly buyer's guide to multicloud

    Sponsored by: TechTarget ComputerWeekly.com

    Enterprise's shift towards multicloud is ever-increasing. Computer Weekly looks at the importance of software-defined wide area networks in successful migration, the complications that come with juggling clouds and Microsoft's journey into multicloud support.

  • A Computer Weekly Buyer's Guide to Hyper Converged Infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    Hyper-convergence has become a buzzword for bringing together hardware and software for multiple tasks. In this 12-page buyer's guide, Computer Weekly looks at tips for buying hyper-convergedsystems, what the technologies can do for your organisation, and how the market is shaping up.

  • A Computer Weekly e-guide on Network Visibility, Performance and Monitoring

    Sponsored by: TechTarget ComputerWeekly.com

    Traditional discourse around networks is centred around the basic premise of if you build it they will come. And if they come, they will be able to use the network to its fullest extent and everyone will be happy.

  • Computer Weekly – 29 November 2016: Machine learning keeps customers happy at Ocado

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how data scientists at online grocer Ocado are using machine learning technology to deliver better customer service. Manufacturing giant GE is making a play to become a top 10 software supplier. And we examine the future of server operating systems as workloads move to the cloud. Read the issue now.

  • The CISO Guide to Ransomware Prevention

    Sponsored by: Checkpoint Software Technologies

    Over the last 5 years, ransomware attacks have increased by 13%, with the average cost exceeding $1.8 million per incident. This white paper presents a CISO’s guide to ransomware prevention, including insights from Check Point VP Security Engineering, Jeff Schwartz. Read on to learn more.

  • Computer Weekly – 23 July 2024: Serving up a GenAI experience at Wimbledon

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we go behind the scenes at Wimbledon to find out how technology is improving the tennis experience for fans. We talk to Meta's AI research chief about the challenges and opportunities of large language models. And we find out why cloud databases are becoming increasingly popular. Read the issue now.

  • Assessing The Value Of HR Tech: Going Beyond The Numbers

    Sponsored by: Sage

    This white paper explores how to assess the true value of HR technology, beyond just cost savings. It outlines quantifiable and non-quantifiable benefits, and how to get the most from your HR tech investment. Read the full white paper to learn how to realize continual value from your HR cloud platform.

  • The Complete Guide To Oracle Hyperion Support Services

    Sponsored by: US Analytics

    If you don’t want to hire an in-house admin to manage Oracle Hyperion, you can instead consider Hyperion managed services. However, several questions may arise during this process related to cost and levels of support. Read this e-book to get these questions answered and to ensure your deployment and administration is smooth and streamlined.

  • Real-Time Customer Intelligence For Exceptional Experience

    Sponsored by: SAS

    To enhance CX, brands must leverage new technologies like AI to predict consumer needs while becoming increasingly transparent regarding data privacy. It’s also crucial to coordinate across departments to enable the consistent and relevant experience that consumers crave. Access this e-book now to learn how you can assess your CX maturity.

  • How manufacturing organisations can build agile and cyber resilient supply chains

    Sponsored by: Vodafone

    In this eBook, you’ll learn about what issues manufacturing organizations are facing, key trends that are impacting them and how technology can help these firms build resilient supply chains against operational risks. Read the eBook.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.