ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"

  • 36 Ways (And Counting) Employee-Guided Payroll Frees HR

    Sponsored by: Paycom

    Employee-guided payroll eliminates 36+ tedious HR tasks by empowering workers to verify pay accuracy. A study shows this approach cuts payroll processing time by 90%. Read how single HR software and automation transform HR into strategic advisors, freeing them from data entry and error correction.

  • A Computer Weekly buyer's guide to modern enterprise resource planning

    Sponsored by: TechTarget ComputerWeekly.com

    The use of modern enterprise resource planning can make a business more agile. In this 14-page buyer's guide, Computer Weekly looks at how to best prepare for modernisation, the opportunity to build sustainably and how to unshackle your firm from unplanned upgrade needs.

  • Trouble at your door: targeted cyber attacks in the UK and Europe

    Sponsored by: TechTarget ComputerWeekly.com

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • Using IT initiatives to save money and reinforce green credentials

    Sponsored by: TechTarget ComputerWeekly.com

    Analyst Group Quocirca explains how organisations can use web data caching software to save money and improve their green credentials.

  • Computer Weekly – 14 November 2023: The UK AI Safety Summit – what did it achieve?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look back at the UK government's AI Safety Summit and assess what it achieved – and what it didn't. Our latest buyer's guide examines the future of business software and modernising legacy applications. And we find out how the UK PSTI Act aims to protect your smart devices. Read the issue now.

  • Computer Weekly – 13 September 2022: Source responsibly: Tech sector efforts to root out forced labour are failing

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we analyse the technology industry's failure to extirpate forced labour and slavery from its supply chains. We find out how cyber security firm Okta is rebuilding customer trust after a major security incident. And we discover how Caterpillar is modernising its data management. Read the issue now.

  • Hacking the Human Operating System

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

  • 2024 API Security & Management Report

    Sponsored by: Cloudflare

    Access this analyst report for a valuable benchmark for your organization to holistically assess the health of your API endpoint management, and new ways your API security strategy can incorporate data to manage visibility, performance, and risks.

  • Computer Weekly – 9 January 2018: Countdown to GDPR

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, with the EU General Data Protection Regulation (GDPR) coming in to force this year, we look at the challenges for businesses to comply by the 25 May deadline. We examine the future for HPE as CEO Meg Whitman steps down. And we find out how hyper-converged systems affect your backup strategy. Read the issue now.

  • Why Businesses Must Plan for Succession

    Sponsored by: Paycom

    Succession planning is critical, yet only 21% of companies have a plan in place. This guide offers 7 strategies to prepare, including starting loose, checking egos, and developing talent. Plan now so your business can thrive for decades. Read the full white paper for insights to ensure continuity.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.