ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30start=30"

  • Clouds in the desert as Middle East transforms

    Sponsored by: TechTarget ComputerWeekly.com

    Cloud computing is driving digital transformation across the Middle East, with the take-up of on-demand computing resources surging. Read in this e-guide why technology suppliers are building cloud infrastructures across the region and why businesses crave them.

  • PKI: Are You Doing It Wrong?

    Sponsored by: Venafi

    A foundation of trust in modern businesses, this white paper argues, is a well-maintained public key infrastructure (PKI). Unfortunately, many organizations are making mistakes that compromise their PKI management. To learn about those mistakes – and how to sidestep them – download the paper.

  • Computer Weekly – 5 December 2023: Technologies to support hybrid working

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at technologies to support hybrid working – even when your business is as unique as farming. Read the issue now.

  • Designing Customer Conversations: Best Practices

    Sponsored by: Talkdesk

    To design customer conversations, it’s crucial to consider the user experiences and not just the artificial intelligence that’s behind the processes. However, to do this, companies need to know the dos and don’ts for successful virtual agents, as well as the basics for creating proper customer conversations. Access the guide to learn more.

  • 6 Hiring Dashboards Every Recruiting Team Needs

    Sponsored by: GEM

    Discover the 6 hiring dashboards every recruiting team needs to centralize data, visualize trends, and optimize the hiring process. Download this white paper to learn how to build the perfect dashboard for your organization.

  • Mastering Recruitment Metrics An In-Depth Guide

    Sponsored by: GEM

    Discover how to leverage recruitment metrics to transform recruiters into talent acquisition authorities, debug hiring funnels, forecast progress, and demonstrate recruiting's impact on the business. Download the in-depth guide to learn more.

  • Threat Intelligence Report 2024

    Sponsored by: NOKIA

    The latest Threat Intelligence Report from Nokia explores emerging cybersecurity trends and technologies impacting the telecom industry. Gain insights into global attack patterns, DDoS threat evolution, and the role of AI and quantum computing. Download the full report to stay ahead of evolving cyber threats.

  • What does cloud computing look like in 2016?

    Sponsored by: TechTarget ComputerWeekly.com

    Cloud computing today is in a phase of rapid take-up. Technology as a service is a top priority for CIOs in Southeast Asia.This guide gives examples of how cloud computing is being harnessed within the region.

  • Optimize deployment of generative AI models with NVIDIA NIM on AWS

    Sponsored by: AWS & NVIDIA

    Simplify deployment of generative AI models with NVIDIA NIM on AWS. Accelerate inference, optimize infrastructure, and maintain security and control of AI applications and data. Deploy production-grade NIM microservices with NVIDIA AI Enterprise on AWS. Learn more.

  • Maximizing the Business Value of AI with a Digital Platform

    Sponsored by: ServiceNow

    As companies enhance digital capabilities, maximizing AI value is critical. This IDC report explores how a digital platform approach can help organizations drive business impact through AI, improve customer experience, and achieve better outcomes. Download the full report to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.