ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"

  • Going big: why companies need to focus on operational analytics

    Sponsored by: TechTarget ComputerWeekly.com

    This report from Capgemini Consulting shows how the search for competitive advantage has driven organisations to shift the focus of their analytical efforts to back office operations

  • Computer Weekly – 23 May 2017: Global ransomware attack could be a security wake-up call

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the global WannaCry ransomware attack that spread over 150 countries – will it be the wake-up call to take cyber security seriously? Also, find out how Moscow is leading the way in smart city digitisation. And our latest buyer's guide examines customer experience management.

  • CW ANZ: Fix the weak links

    Sponsored by: TechTarget ComputerWeekly.com

    In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.

  • How do you solve a problem like security training?

    Sponsored by: TechTarget ComputerWeekly.com

    In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.

  • Your Essential Small Business Guide For HR Automation

    Sponsored by: Sage

    Learn how HR automation can save your small business time and money by streamlining repetitive HR tasks like onboarding, timekeeping and performance management. Read the guide to find out the benefits of automation and to access a step-by-step checklist to get started.

  • Computer Weekly – 10 July 2018: Tackling the digital identity problem

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as UK government attempts to create a digital identity standard flounder, we examine progress on establishing the online ID system the digital economy needs. Barclays bank talks about its move to DevOps and public cloud. And we find out how AI could help improve IT service management. Read the issue now.

  • How Do Vulnerabilities Get Into Software?

    Sponsored by: Veracode, Inc.

    Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.

  • CW Nordics November 2016

    Sponsored by: TechTarget ComputerWeekly.com

    This quarter, we look at the impact of Nokia layoffs on Finland, and in particular the city of Espoo which is home to both Nokia and Microsoft's Finnish headquarters. We also look at how Denmark's Bang & Olufsen is taking control of sales data with cloud-based software.

  • 15 Machine Learning Use Cases to Solve Everyday Business Problems

    Sponsored by: Alteryx

    When most people think about machine learning, they assume it’s a complex form of AI beyond their reach, requiring hours of coding and complex algorithms to create functional models. But with modern analytics solutions like Alteryx, anyone can create and automate ML models in minutes. Read on to discover 15 use cases for immediate business impact.

  • The Business Value of Google Cloud IaaS

    Sponsored by: Google Cloud And Intel

    In this IDC white paper, discover how Google IaaS can help your organization realize significant business value and a 318% 5-year return on investment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.