ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=20start=20start=30start=30start=20"

  • Computer Weekly – 6 February 2024: Generative AI – an early adopter's experience

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.

  • Defining the datacentre needs of 21st century enterprises

    Sponsored by: TechTarget ComputerWeekly.com

    This guide is designed to provide IT leaders with some insight into how their peers are addressing current problems through the use of cloud and colocation, and shine a light on how the analyst community sees the role of the datacentre changing over time.

  • Robotic Process Automation blends into AI for thoroughly modern ERP

    Sponsored by: TechTarget ComputerWeekly.com

    Robotic Process Automation has emerged in recent years as one way to modernise the ERP systems that run the entire gamut of business processes for many organisations. Download this e-guide and read more about how the advance of the robots continues.

  • Your guide to disaster recovery strategy and the ways virtualisation can help

    Sponsored by: TechTarget ComputerWeekly.com

    We take a good look at how features and functionality built into popular virtualisation environments can help with disaster recovery planning, testing and execution.

  • Doing More With Less Cost-Effective Application Security And Performance Strategies From 7 Companies.

    Sponsored by: Cloudflare

    While the cost of security breaches continues to increase, many security teams have found ways of achieving success with limited resources. This white paper shares real-life stories of companies that have successfully created efficiencies and cut costs in their application security strategy. Download now to discover more.

  • Doing More With Less Cost-Effective Application Security And Performance Strategies From 7 Companies.

    Sponsored by: Cloudflare

    While the cost of security breaches continues to increase, many security teams have found ways of achieving success with limited resources. This white paper shares real-life stories of companies that have successfully created efficiencies and cut costs in their application security strategy. Download now to discover more.

  • A hybrid approach: How the conversation around cloud is changing

    Sponsored by: TechTarget ComputerWeekly.com

    Enterprise cloud migrations used to be discussed in absolute terms.  In this e-guide, we take a look at how the conversation around cloud is changing within the enterprise, as migration habits and preferences are shaped by world events, resiliency and business agility concerns, as well as financial considerations.

  • Embracing generative AI

    Sponsored by: Virtusa

    Generative AI is reshaping the workplace, and optimism abounds for its role in enhancing productivity and innovation. This report examines how successful implementations tackle challenges in training, organizational barriers, and governance. Access the full report for details.

  • Email Nurture Revival

    Sponsored by: BrightTALK by TechTarget

    With so many moving parts—from email cadence and personalization to lead qualification and content creation—nurture can get complicated quickly. We understand nurture can be overwhelming but downloading this e-book will help. It breaks down the basic nurture concepts so you can build a successful strategy.

  • 15 Reasons To Adopt Red Hat OpenShift Virtualization

    Sponsored by: Red Hat

    Red Hat OpenShift Virtualization offers a modern platform for virtual machines and container-based applications. Read this e-book to unpack the remaining reasons to migrate your traditional VMs to Red Hat OpenShift.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.