ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"

  • Top 10 telecoms stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    To paraphrase the eternally wonderful Sesame Street: this year's telecoms industry has been brought to you by the number "5", and the letter's "G" and "H". Here is Computer Weekly's top 10 list of what was driving the telecoms industry during 2019.

  • CW ASEAN: Connect your people

    Sponsored by: TechTarget ComputerWeekly.com

    Unified collaboration (UC) is transforming the way business is done globally. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises are embracing UC tools, factors that organizations should consider when developing a UC strategy, and the emergence of startups that have been shaking up the marketplace.

  • A reference architecture for the IoE

    Sponsored by: TechTarget ComputerWeekly.com

    Analyst group Quocirca proposes a basic architecture to help organisations avoid the many pitfalls of embracing the internet of things (IoT).

  • Email Security Buyer's Guide

    Sponsored by: Checkpoint Software Technologies

    Email is currently the number one attack vector, with hackers exploiting the medium to deliver malware, phishing, and other versatile attack types. To help you overcome the challenges presented by email threats, this buyer’s guide to email security breaks down what it means to be an effective email security solution. Read on to learn more.

  • Royal Holloway: Driverless vehicle security for military applications

    Sponsored by: TechTarget ComputerWeekly.com

    Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.

  • CW ANZ: Trend Watch – Security

    Sponsored by: TechTarget ComputerWeekly.com

    With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.

  • Driving a Brownfield SAP S/4HANA Transformation with Confidence

    Sponsored by: Basis Technologies

    Discover best practices for driving a successful SAP S/4HANA transformation, especially for enterprises with complex, customized Brownfield landscapes. Learn how to minimize risk, accelerate delivery, and unlock the full potential of your SAP investment. Read the research content to get started.

  • How to be Resilient Against Cybersecurity Issues in Higher Education.

    Sponsored by: Schneider Electric

    Increasing ransomware attacks, shrinking IT teams: These are two of the many challenges that higher education institutions encounter on the road to stronger cybersecurity. Along with digging into those factors and their implications, this white paper explores how to level up a school’s security posture. Read on to unlock these insights.

  • Quarterly Ransomware Research Report

    Sponsored by: CyberMaxx

    This Q3 2024 ransomware report analyzes the latest trends, including a 2% decrease in attacks compared to Q2 and the rise of the Ransomhub group. The average cost of a data breach continues to grow, highlighting the need for robust security. Read the full report to stay informed on the evolving ransomware landscape.

  • The Top 5 Generative AI questions on every Chief Product Officer’s mind

    Sponsored by: AWS

    This AWS infographic, Top 5 Generative AI Questions on Every Product Team’s Mind, will further your understanding of this new technology and help you guide your customers to greater success with generative AI.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.