ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"

  • SaaS ERP mushrooms during Covid crisis, up to a point

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at the migration of business applications to the cloud, under the discipline of the Covid crisis; we examine the question of who is winning the cloud ERP wars; and offer a case study of one large, complex company, Vodafone, that gives a counter example of how cloud still has limits when it comes to ERP.

  • The promise (and pitfalls) of self-service automation in customer service

    Sponsored by: Talkdesk

    Customers have new standards for service. They want timely, efficient service that’s available to them 24/7. However, this can be difficult for organizations to manage, as most don’t have the resources to meet these expectations. So, how can automation help? Access this guide to learn more.

  • Winning The Data-Centric Digital Business In This Decade

    Sponsored by: Dell Technologies and Intel

    The datacenter has evolved. Where businesses used to see the enterprise datacenter as a location (or locations), the modern datacenter has no physical construct. Rather, the modern datacenter emphasizes data – and spans the core to the cloud and the edge. Access this white paper now to learn more.

  • No deal Brexit: Ideal or Ordeal?

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.

  • Navigating Disruption with Generative AI Strategies

    Sponsored by: Foundever

    Enterprises must adapt to evolving customer expectations and technology disruption. Generative AI offers strategic advantages to help modernize customer experience, optimize operations, and future-proof the business. Download this analyst report to learn how to leverage Generative AI for your CX transformation.

  • Accelerating Zero Trust Capabilities

    Sponsored by: Saviynt

    The rapid growth of adversarial cyber threats emphasizes the need for the Department of Defense (DoD) to adapt and improve our deterrence strategies and cybersecurity implementations. In this whitepaper, Saviynt will hone in on the three specific pillars that require agencies to protect users, systems, and data at the identity layer.

  • A Computer Weekly buyer's guide to retail technology

    Sponsored by: TechTarget ComputerWeekly.com

    The retail industry is evolving alongside the emergence of new technologies. In this 15-page buyer's guide, Computer Weekly looks at how retailers are using AI, the importance of good digital customer experience and how mobiles have transformed the purchasing process.

  • The complex environment facing financial services

    Sponsored by: Tanium

    Today, banks and insurers sell through digital channels while their customers interact digitally as well. As a result, financial services companies are the target of frequent and severe cyberattacks. In this report, learn about the scope and scale of the threat landscape and what this sector can do to gain visibility into their IT environments.

  • CW Middle East ezine April 2018

    Sponsored by: TechTarget ComputerWeekly.com

    The Middle East region is on a path, or even fast track, to becoming a global digital hub. But any country or region heading in this direction will have some fundamentals to get right.

  • A Computer Weekly e-Guide to IAM

    Sponsored by: TechTarget ComputerWeekly.com

    We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.