ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30start=30"

  • Digital Disruption Index: Aligning strategy, workforce and technology

    Sponsored by: TechTarget ComputerWeekly.com

    Business leaders' confidence in the digital capabilities of new entrants to the workplace has improved in the past six months, according to the Digital Disruption Index by Deloitte.

  • Computer Weekly - 19 July 2022: Tracking the rise of homeworking across the UK

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, homeworking has more than doubled in the UK due to the pandemic – we look at the regional differences. The pressure is growing on cyber security teams – we find out how to avoid staff burnout and lost talent. And we examine the role that tech startups play in the growth of Amazon Web Services. Read the issue now.

  • CW APAC – Trend Watch: CIO trends

    Sponsored by: TechTarget ComputerWeekly.com

    Organisations have plenty of technologies to keep track of when digitising their operations. In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at IT predictions for 2024, how India's space missions will propel tech and Australia's advances in cyber security.

  • A Deep Dive into Shadow IT: Examples, Risks, and Solutions

    Sponsored by: Auvik Networks, Inc.

    Shadow IT threatens data security and compliance. In this white paper, discover examples like unapproved comms tools or personal devices, and learn how to tackle shadow IT risks and solutions.

  • Multi cloud backup and recovery best practices

    Sponsored by: TechTarget ComputerWeekly.com

    User concerns about data availability and safety continue to grow. And despite being in the early phases of the multi-cloud movement, experts have provided some good guidelines to users to help them implement this additional layer of protection. This guide details multi-cloud backup and recovery best practices, and presents potential pain points.

  • Computer Weekly – 29 January 2019: A vintage digital transformation for Majestic Wines

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the digital transformation of retailer Majestic Wines and find out how buying rival Naked Wines led to a cloud overhaul of the firm's IT. We look at the challenges for IT managers as they prepare for the end of Windows 7 support. And our buyer's guide discusses deep learning technology. Read the issue now.

  • CIO Trends #7: Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide features articles outlining how Norway's tax office is fighting economic crime through the use of the latest IT, why Nokia has been at the centre of an investigation following a blackmail scandal and what caused Visa's global payment system to go offline in June 2018.

  • How manufacturing organisations can build agile and cyber resilient supply chains

    Sponsored by: Vodafone

    In this eBook, you’ll learn about what issues manufacturing organizations are facing, key trends that are impacting them and how technology can help these firms build resilient supply chains against operational risks. Read the eBook.

  • Three Steps to Authentic Connections in B2B

    Sponsored by: BrightTALK by TechTarget

    In today’s B2B marketplace, buyers no longer fall prey to one-size-fits-all marketing campaigns and pushy sales calls. Authenticity is key—and webinars and videos are key to achieving the human touch. They're also consistently ranked as the top performing content marketing tactics. Explore the 3 steps to authentic connections in B2B here.

  • The Secure Coding Handbook

    Sponsored by: Veracode

    This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.