Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30"
-
Case Study: M&A in action - How Majestic Wine paired with Naked Wines to fuel cloud-led digital transformation
Sponsored by: TechTarget ComputerWeekly.comFind out how the acquisition of online-only wine retailer Naked Wines in 2015 has shaped the digital transformation plans of its parent company Majestic Wine
-
Communicating Culture to Attract Top Talent
Sponsored by: GEMDiscover the elements of a strong recruitment marketing strategy to attract top talent. Learn how to define your EVP, create candidate personas, leverage social media, and more. Download this e-book to build an effective inbound recruiting program.
-
Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
-
UPSTACK DIGEST Cybersecurity
Sponsored by: Upstack, Inc.This complimentary digest is filled with advice from UPSTACK experts in the trenches of today’s cyberwar.
-
MicroScope - December 2017: Unlock the potential of DaaS
Sponsored by: MicroScopeThis month's MicroScope ezine looks at the issues around device as a service (DaaS), the outlook from HP and a report from the UK CompTIA conference.
-
CW APAC - June 2021: Career guide to cloud computing
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly looks at the skills required for cloud professionals to succeed in an evolving industry, the risk to jobs posed by automation and the disciplines being taught at Future Tech Academy
-
Building a Cyberresilient Data Recovery Strategy
Sponsored by: Veeam SoftwareBuilding a holistic cybersecurity program can be complex and multifaceted, but organizations that leverage frameworks such as the NIST Cybersecurity Framework 2.0, can better establish standards, guidelines and best practices to manage their cybersecurity risk. Read this new white paper and learn how.
-
CW ASEAN: European data law - be aware and prepare
Sponsored by: TechTarget ComputerWeekly.comBusinesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.
-
Salesforce Sales Teams Win More With Slack.
Sponsored by: SlackSalesforce teams use Slack for communication, automation, and culture. It helps executives manage sales tasks and approvals efficiently. Automated workflows prompt updates, saving time. Explore how Slack can enhance your sales teams by reading about Salesforce's success with Slack in this case study.
-
Salesforce Sales Teams Win More With Slack.
Sponsored by: SlackSalesforce teams use Slack for communication, automation, and culture. It helps executives manage sales tasks and approvals efficiently. Automated workflows prompt updates, saving time. Explore how Slack can enhance your sales teams by reading about Salesforce's success with Slack in this case study.