ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=20start=10"

  • Guide to business continuity planning during COVID-19

    Sponsored by: TechTarget ComputerWeekly.com

    As COVID-19 continues to spread, companies need to evaluate their ability to conduct business as usual during this time. Inside this comprehensive guide, we share best practices on how to defend your business against disruption, identify key business areas at risk and respond to business continuity planning challenges.

  • Why Data Centers Must Prioritize Environmental Sustainability: Four Key Drivers

    Sponsored by: Schneider Electric

    Data centers must prioritize environmental sustainability due to customer demands, regulations, business value, and ESG investment. Learn how to secure remote access, reduce emissions, and build user trust by reading this white paper now.

  • A 4-Step Plan For Denial Prevention

    Sponsored by: Waystar

    What do you do when staff don’t have the time, money, or resources to work denials as thoroughly as they’d like? The technology and tactics to prevent denials is here and you can unlock a proven approach to denial prevention. Get a step-by-step denial prevention plan in this e-book.

  • Agile today & tomorrow: Shaping organizational transformation

    Sponsored by: Appfire

    Appfire and Vanson Bourne surveyed 450 global technology decision-makers and found that 94% of their organizations use agile methodologies, with budgets up by 10% on average. This e-book explores the trends, challenges, maturity levels, and future of agile implementation in organizations like yours. Download your copy to access its chapters.

  • Building a Cybersecurity Strategy for the Digital Economy

    Sponsored by: Schneider Electric

    Download this e-book for help establishing a pragmatic approach for creating a multi-layered cybersecurity strategy to help you reduce your business and digital risks.

  • CW Europe: December 2016 - February 2017

    Sponsored by: TechTarget ComputerWeekly.com

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

  • Red Hat Ansible Automation Platform A beginners guide

    Sponsored by: Red Hat

    Discover how Red Hat Ansible Automation Platform can help your organization automate IT tasks, improve efficiency, and deliver digital services faster. Learn about the platform's features, benefits, and how to get started. Download the e-book to explore your automation journey.

  • The Big Book of Genai 5 Ways to Leverage Your data to build Production-Quality GenAl Applications

    Sponsored by: DataBricks

    This 118-page e-book is a thorough guide to deploying GenAI applications. It details the entire GenAI process, from using foundation models to custom model pretraining and fine-tuning. Access the full e-book now to learn how you can unlock the potential of GenAI for your organization.

  • A guide to developing modern mobile applications

    Sponsored by: TechTarget ComputerWeekly.com

    A key ingredient of eBusiness is the ability to offer customers the very best user experience, irrespective of whether they use a web browser, a mobile browser or a mobile app. In this guide, we explore the challenges organisations face in managing the numerous ways customers can transact with businesses.

  • The CISO's guide to supply chain security

    Sponsored by: TechTarget ComputerWeekly.com

    Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.