ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=20start=10"

  • Put Windows 11 at the center of your security strategy

    Sponsored by: Assembly Global

    Cyber attacks are more prevalent than ever, with a reported spike of over 200% since 2023. To ensure you're less likely to fall victim to sinister efforts, there are simple measures at your disposal right now. It's time to amplify Windows 11 benefits with the power of the Lenovo Think ecosystem. Read the full article now to learn more.

  • Computer Weekly – 23 April 2024: How data keeps Britain's trains on track

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how Network Rail is ensuring train safety in the face of extreme weather thanks to advanced data analytics. Our latest buyer's guide examines the latest trends in storage technology. And we talk to the Ministry of Defence's first ever chief data officer. Read the issue now.

  • Infographic: Top 10 Technology Trends 2019

    Sponsored by: TechTarget ComputerWeekly.com

    In this infographic, discover the top 10 technology trends for 2019 as predicted by Gartner. For digital-minded CIOs, Gartner's 2019 top 10 technology trends should come as no surprise: IT is getting smarter, casting an intelligent digital web over the enterprise -- and everywhere else.

  • Unleash the power of generative AI: build better applications, faster

    Sponsored by: AWS

    The eBook “Unleash the Power of Generative AI: Build Better Applications, Faster” describes how companies and their application developers can overcome the barriers to generative AI adoption by leveraging AWS tools and services.

  • Royal Holloway: Secure connected and autonomous vehicles - the long road ahead

    Sponsored by: TechTarget ComputerWeekly.com

    Advances in technology have led to  safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.

  • How Does Your Sales Development Program Measure Up?

    Sponsored by: TechTarget

    To understand the factors leading to poor SDR retention, TechTarget, Tenbound and RevOps Squared surveyed 218 sales leaders. Review the findings in this report, “How Does Your Sales Development Program Measure Up?”

  • Enhancing Healthcare Security: NIST Framework and Health Breach Notification Rule

    Sponsored by: XtelligentMedia Healthcare

    The collection of best practices and standards found in the NIST Cybersecurity Framework can help healthcare organizations improve their overall security postures.Vendors of personal health records, including health apps and other non-HIPAA-covered businesses, are subject to the Federal Trade Commission's Health Breach Notification Rule.

  • Unified Communication: “It should work as easily as a telephone call!”

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security series explains the security implications of unified communication.

  • The CHRO guide to unleashing agility and bottom-line benefits

    Sponsored by: ServiceNow

    For today’s businesses, managing risk and building resilience in their HR operations has never been more important. To do so, many have turned to strengthening their employee productivity and development plans. However, many can find these methods daunting. Browse this guide to learn more.

  • Mapping and Reducing Scope 3 Emissions

    Sponsored by: GEP

    Today, procurement organizations face a handful of pressing sustainability issues, the most formidable of them being scope 3 emissions. So, how can companies best address these problems and build an effective, end-to-end emissions reduction framework? Browse this white paper to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.