ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"

  • Implementing GenAI: Use cases & challenges

    Sponsored by: TechTarget ComputerWeekly.com

    The use cases of generative AI are wide-ranging and have the potential to impact nearly all areas in business and IT. In this e-guide on generative AI, learn how to put the technology to work in business applications, DevOps and IT, as well as manage implementation challenges and risks.

  • How to enhance your network for the future

    Sponsored by: TechTarget ComputerWeekly.com

    The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.

  • A Computer Weekly buyer's guide to optimising storage

    Sponsored by: TechTarget ComputerWeekly.com

    The implementation of effective storage optimisation has becomean important factor in business. In this 12-page buyer's guide,Computer Weekly looks at cost implications, the hyper-convergedinfrastructure minefield and the alternatives to shared storage

  • Stronger collaboration platforms emerge as pandemic legacy

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: HR software had long been a relatively backward zone of enterprise software before the Covid-19 pandemic. It had been catching up, as organisations applied digital approaches drawn from customer experience to employee experience, encompassing the journey from recruitment, through working and learning, to moving up or moving on.

  • How To Deploy A Password Policy

    Sponsored by: Specops Software

    This white paper provides an end-to-end guide for rolling out a new password policy in your organization. Learn how to plan, set up, deploy, and communicate the policy to keep your Active Directory secure. Download the white paper to get started.

  • Computer Weekly - 29 October 2019: IR35 reforms - the difficult decisions facing IT contractors

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.

  • CW Middle East – January 2017

    Sponsored by: TechTarget ComputerWeekly.com

    In this quarter's CW Middle East ezine, we look at how the Middle East, with the poorest road safety record in the world, could benefit most from self-driving cars.

  • Real-Time Customer Intelligence For Exceptional Experience

    Sponsored by: SAS

    To enhance CX, brands must leverage new technologies like AI to predict consumer needs while becoming increasingly transparent regarding data privacy. It’s also crucial to coordinate across departments to enable the consistent and relevant experience that consumers crave. Access this e-book now to learn how you can assess your CX maturity.

  • A Computer Weekly Buyer's Guide: Office Productivity for Home Workers

    Sponsored by: TechTarget ComputerWeekly.com

    The question of productivity has become an inevitable consideration since the pandemic made home working commonplace. In this 16-page buyer's guide, Computer Weekly looks at how it's being maintained, the advantages a remote workforce brings to business and the hybrid model being embraced by workers.

  • Ultimate guide to digital transformation for enterprise leaders

    Sponsored by: TechTarget ComputerWeekly.com

    This in-depth guide explains what digital transformation is, why it is important and how enterprises can successfully transition to this new business paradigm.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.