ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30"

  • Case Study: M&A in action - How Majestic Wine paired with Naked Wines to fuel cloud-led digital transformation

    Sponsored by: TechTarget ComputerWeekly.com

    Find out how the acquisition of online-only wine retailer Naked Wines in 2015 has shaped the digital transformation plans of its parent company Majestic Wine

  • Communicating Culture to Attract Top Talent

    Sponsored by: GEM

    Discover the elements of a strong recruitment marketing strategy to attract top talent. Learn how to define your EVP, create candidate personas, leverage social media, and more. Download this e-book to build an effective inbound recruiting program.

  • Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.

  • UPSTACK DIGEST Cybersecurity

    Sponsored by: Upstack, Inc.

    This complimentary digest is filled with advice from UPSTACK experts in the trenches of today’s cyberwar.

  • MicroScope - December 2017: Unlock the potential of DaaS

    Sponsored by: MicroScope

    This month's MicroScope ezine looks at the issues around device as a service (DaaS), the outlook from HP and a report from the UK CompTIA conference.

  • CW APAC - June 2021: Career guide to cloud computing

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at the skills required for cloud professionals to succeed in an evolving industry, the risk to jobs posed by automation and the disciplines being taught at Future Tech Academy

  • Building a Cyberresilient Data Recovery Strategy

    Sponsored by: Veeam Software

    Building a holistic cybersecurity program can be complex and multifaceted, but organizations that leverage frameworks such as the NIST Cybersecurity Framework 2.0, can better establish standards, guidelines and best practices to manage their cybersecurity risk. Read this new white paper and learn how.

  • CW ASEAN: European data law - be aware and prepare

    Sponsored by: TechTarget ComputerWeekly.com

    Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.

  • Salesforce Sales Teams Win More With Slack.

    Sponsored by: Slack

    Salesforce teams use Slack for communication, automation, and culture. It helps executives manage sales tasks and approvals efficiently. Automated workflows prompt updates, saving time. Explore how Slack can enhance your sales teams by reading about Salesforce's success with Slack in this case study.

  • Salesforce Sales Teams Win More With Slack.

    Sponsored by: Slack

    Salesforce teams use Slack for communication, automation, and culture. It helps executives manage sales tasks and approvals efficiently. Automated workflows prompt updates, saving time. Explore how Slack can enhance your sales teams by reading about Salesforce's success with Slack in this case study.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.