ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=10start=10start=20start=20start=20start=10"

  • Anatomy Of Identity Based Attacks

    Sponsored by: Okta

    74% of all breaches involve some form of human factor, whether it be error, credential theft, or social engineering. This white paper looks at the growing threats impacting organizations today, and how Okta can play a role in threat protection, detection, and response, before, during, and after the point of authentication.Read on to learn more.

  • Market Study Contact center of 2030

    Sponsored by: Foundever

    Contact center leaders expect major transformations by 2030, including cloud-based platforms, remote workforces, and data-driven decisions. Discover the key findings and action plans for the contact center of the future in this exclusive market study.

  • The Next Destination For Manufacturing: A Cloud-Based MES

    Sponsored by: GE Vernova & AWS

    Discover how a cloud-based manufacturing execution system (MES) can transform your operations. Gain real-time insights, reduce costs, and scale faster with GE Vernova's Proficy® Software and Services on AWS. Read the e-book to learn more.

  • A Computer Weekly Buyer's Guide to Enterprise Open Source

    Sponsored by: TechTarget ComputerWeekly.com

    In this 13-page buyer's guide, Computer Weekly looks at open source technology. Discover more about why open source has become the infrastructure choice over commercial software; the due diligence required to reap the rewards of open source and how to choose the best fit for your needs.

  • Computer Weekly – 28 June 2022: Why collaboration – not competition – is the key to IT sustainability

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as sustainability rises up the corporate agenda, IT leaders say more collaboration is needed to meet climate goals. Microsoft faces further calls for greater transparency over software tools used to monitor employees. And the cyber security industry warns over an increasing loss of talent. Read the issue now.

  • 2024 Workplace Experience Trends & Insights Report

    Sponsored by: Appspace

    What do employees today want from their workplace experience? What’s working? What’s not? And what can you do about it? You don’t have to guess – because the 2024 Workplace experience trends & insights report from Appspace is here. Access this report to learn more.

  • Moving Your SAS 9 Estate to the Cloud: Five Questions to Guide Your Journey

    Sponsored by: SAS

    Today, the moment has come for tech leaders to reassess the current cloud landscape and incorporate emerging technologies into an evolved approach to cloud analytics.Download this white paper, which will serve you as a guide to the state of cloud analytics, equipping you with 5 key questions to guide your journey.

  • Cloud Cost Management and FinOps

    Sponsored by: Aviatrix Systems

    Various obstacles, including cloud complexity and poor visibility, can hinder an organization’s ability to effectively manage cloud costs. Along with unpacking those challenges, this research report explores how to overcome them. Keep reading to unlock those insights and to learn about the future of cloud cost management.

  • A Computer Weekly buyer's guide to blockchain technology

    Sponsored by: TechTarget ComputerWeekly.com

    Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.

  • How to Evaluate Threat Intelligence Feeds

    Sponsored by: ReversingLabs

    Know When Software Is Malware. With this guide, you will learn how to evaluate open source and commercial threat intelligence feeds to ensure you have relevant and useful information about malware, ransomware, Indicators of Compromise (IoC) and threat actors, so that your team can identify malicious events and reduce noisy, time-consuming alerts.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.