ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=10start=10start=20start=30start=10start=30"

  • Automate Google Cloud with Red Hat Ansible Automation Platform

    Sponsored by: Red Hat

    Explore how to automate Google Cloud with Red Hat Ansible Automation Platform. Learn about integrated billing, enterprise support, and cloud automation use cases like health checks and VPC management. Read on to see how Ansible can accelerate your organization's cloud automation and the benefits of hybrid cloud automation in general.

  • Unified Logistics and Omni Channel Execution

    Sponsored by: Blue Yonder

    For many online retailers, the average cost to fulfill an order is 70% of the average order value. This coupled with next or same-day delivery expectations can make it difficult for organizations to increase their profit margins. So, what are the best ways to do so? Browse this guide to learn more.

  • Intelligent Workload Portability for a Modern, Agile Hybrid Cloud

    Sponsored by: Nutanix

    This analyst report explores how intelligent workload portability in a hybrid cloud environment can simplify application deployment and management. It also outlines key factors to consider for workload placement and migration, as well as the benefits of a consistent hybrid multicloud platform. Read on now to learn more.

  • The ultimate guide to data preparation

    Sponsored by: TechTarget ComputerWeekly.com

    Poor data equates to wrong decisions, bias in the AI algorithm and flawed decision-making. What's more, data that personally identifies an individual can only be used in very specific ways, as stipulated by GDPR. Read about data preparation in this e-guide.

  • A Computer Weekly buyer's guide to blockchain technology

    Sponsored by: TechTarget ComputerWeekly.com

    Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.

  • How to Evaluate Threat Intelligence Feeds

    Sponsored by: ReversingLabs

    Know When Software Is Malware. With this guide, you will learn how to evaluate open source and commercial threat intelligence feeds to ensure you have relevant and useful information about malware, ransomware, Indicators of Compromise (IoC) and threat actors, so that your team can identify malicious events and reduce noisy, time-consuming alerts.

  • Jargon Buster Guide to Unified Communications

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we will explore and define some of the key elements of a UC deployment and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives.

  • Accelerated enterprise advancements in Cloud and Data Center

    Sponsored by: Atlassian

    Explore Atlassian's latest cloud and data center innovations that empower enterprises with scalable, secure, and compliant collaboration. Learn how you can accelerate your digital transformation by reading the full white paper.

  • Personal branding in the digital age: How to become a known expert, thrive and make a difference in a connected world

    Sponsored by: TechTarget ComputerWeekly.com

    This chapter from Francine Beleyi's book Personal branding in the digital age, explains the seven key pillars you need to build a successful personal brand.

  • Research Report The Changing Face Of HR Research Report

    Sponsored by: Sage

    Today, HR workforces are asked to do more than ever. 95% of HR leaders report that they’re taking on a record amount of responsibilities, and 91% say that their workload and hours have increased. This presents several challenges for teams and other business leaders. So, how can these problems be solved? Browse this report to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.