ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=10start=20start=10start=30start=20start=20"

  • Employee Empowerment In A Healthcare Contact Center

    Sponsored by: Talkdesk

    Today, healthcare providers have ample opportunity to ensure quality service. But current issues facing the industry such as the great resignation, budget constraints, and heightened consumer expectations, make things difficult for your agents. For a better patient experience, your first focus should be on the contact center. Read on to learn why.

  • A Computer Weekly e-guide to SASE

    Sponsored by: TechTarget ComputerWeekly.com

    Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.

  • Proving ownership of IPv6 addresses

    Sponsored by: TechTarget ComputerWeekly.com

    In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.

  • Analyzing the economic benefits of enterprise cellular solutions in branch locations

    Sponsored by: Ericsson

    Ericsson Enterprise Wireless Solutions can provide significant benefits, including improved business agility, better financials, and enhanced business continuity. Explore how these solutions can help your organization expand operations and reach its goals. Read the Enterprise Strategy Group report to learn more.

  • How Audit Compliance and Cloud Adoption Affects IT Security

    Sponsored by: Dell Software

    Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.

  • Compliance and Security Report 2024/25

    Sponsored by: Theta Lake

    As UCC tool adoption rises, firms face compliance and security challenges with unmonitored communications, unifying archiving, and more. This research report by Theta Lake, "Digital Communications Governance & Archiving: Compliance & Security Report 2024/25," offers tips for overcoming those obstacles. Read on to access the insights.

  • Computer Weekly – 19 December 2023: The ransomware threat to UK critical infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a parliamentary report warns that a lack of ransomware preparedness at the highest levels of government is leaving UK critical national infrastructure dangerously exposed – we analyse the risks. We also examine how AI tools are helping to enhance cloud security. Read the issue now.

  • Technology industry at the cross-roads: Transforming quote-to-cash operations

    Sponsored by: TechTarget ComputerWeekly.com

    This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process.

  • The Business Case for Employee Recognition

    Sponsored by: O.C. Tanner

    Explore the business case for employee recognition. Learn how it can boost retention, engagement, and productivity - and see the measurable HR and financial benefits. Download this white paper to discover the ideal recognition budget and the return on your investment.

  • 6 Ways to Supercharge Developer Workflows with Jira Service Management

    Sponsored by: Atlassian

    Streamline developer workflows with Jira Service Management. Unite development, IT, and business teams on one platform. Prioritize work, deploy changes faster, and accelerate incident response. Learn more by downloading the white paper.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2025 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.