ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=10start=20start=10start=30start=20start=20"

  • AI in Fraud Management: Uses cases, benefits and challenges

    Sponsored by: TechTarget ComputerWeekly.com

    AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.

  • A Computer Weekly buyer's guide to expense management

    Sponsored by: TechTarget ComputerWeekly.com

    Every year, UK businesses deal with about £10bn in expenses claims, but surprisingly few use IT to manage that spend. In this 12-page buyer's guide, Computer Weekly looks at how the application of expense management tools can reward organisations with immediate cost and time savings

  • Optimizing Supply Chain Performance with the Power of Data

    Sponsored by: InterSystems

    Discover in this e-book the secrets to optimizing supply chain performance with unified data, with insights from 450 senior supply chain decision makers.

  • Critical Power and IT Data continuity for Healthcare

    Sponsored by: Schneider Electric

    Discover in this product overview how Schneider Electric can help you navigate the power and digital solutions landscape to prepare your organization for a future of safe, efficient, and patient-centered healthcare.

  • IAM: Managing identity remains key to cyber security

    Sponsored by: TechTarget ComputerWeekly.com

    IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.

  • Computer Weekly – 12 November 2024: Innovating with weather data at the Met Office

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the Met Office is using its vast stores of weather data to create innovative new products. Our latest buyer's guide looks into identity and access management systems. And we examine the geopolitical threats that could curb the openness of open source. Read the issue now.

  • CW APAC: Trend Watch - Internet of Things

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how APAC firms are putting the internet of things to good use in an increasingly connected world, yet technology integration and security concerns are holding back widespread adoption.

  • Red Hat State Of Linux In The Public Cloud

    Sponsored by: Red Hat

    More and more workloads are moving to public cloud environments, sparking a desire to learn why it is seen as beneficial, and what strategies these new cloud adopters are using to ensure success. Explore these discussions further in this Red Hat research report.

  • A Computer Weekly E-Guide to Network Management & Monitoring

    Sponsored by: TechTarget ComputerWeekly.com

    Covid has introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. SD WAN, SASE and in particular digital transformation are key examples of that.

  • Endpoint security: Hybrid work changes the game

    Sponsored by: TechTarget ComputerWeekly.com

    A scant few years ago, you could be forgiven for thinking that endpoint security was a relatively simple affair, even though it was not.  In this E-Guide, we consider some of the most pressing issues facing the hybrid workplace in terms of endpoint security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.