ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"

  • Nordic banking in the digital age

    Sponsored by: TechTarget ComputerWeekly.com

    Read in this e-guide how Nordic banks are working together to make cross border payments in the region seamless. Also find out how Nordic banks are offering customers the opportunity to make payments via wearable devices and how the region's successful mobile payments platform, MobilePay, is futureproofing its business.

  • How to enhance your network for the future

    Sponsored by: TechTarget ComputerWeekly.com

    The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.

  • Customer analytics in APAC: trends and best practices

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, learn how organisations in the APAC region are harnessing the potential of analytics and what the future of analytics looks like from an application development and self-service perspective.

  • Implementing GenAI: Use cases & challenges

    Sponsored by: TechTarget ComputerWeekly.com

    The use cases of generative AI are wide-ranging and have the potential to impact nearly all areas in business and IT. In this e-guide on generative AI, learn how to put the technology to work in business applications, DevOps and IT, as well as manage implementation challenges and risks.

  • A Computer Weekly buyer's guide to optimising storage

    Sponsored by: TechTarget ComputerWeekly.com

    The implementation of effective storage optimisation has becomean important factor in business. In this 12-page buyer's guide,Computer Weekly looks at cost implications, the hyper-convergedinfrastructure minefield and the alternatives to shared storage

  • How To Deploy A Password Policy

    Sponsored by: Specops Software

    This white paper provides an end-to-end guide for rolling out a new password policy in your organization. Learn how to plan, set up, deploy, and communicate the policy to keep your Active Directory secure. Download the white paper to get started.

  • Stronger collaboration platforms emerge as pandemic legacy

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: HR software had long been a relatively backward zone of enterprise software before the Covid-19 pandemic. It had been catching up, as organisations applied digital approaches drawn from customer experience to employee experience, encompassing the journey from recruitment, through working and learning, to moving up or moving on.

  • Real-Time Customer Intelligence For Exceptional Experience

    Sponsored by: SAS

    To enhance CX, brands must leverage new technologies like AI to predict consumer needs while becoming increasingly transparent regarding data privacy. It’s also crucial to coordinate across departments to enable the consistent and relevant experience that consumers crave. Access this e-book now to learn how you can assess your CX maturity.

  • Computer Weekly - 29 October 2019: IR35 reforms - the difficult decisions facing IT contractors

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.

  • World Economic Forum Global Risks Report 2018

    Sponsored by: TechTarget ComputerWeekly.com

    The World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.