ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=20start=20start=30start=30start=20"

  • Computer Weekly - 16 November 2021: How cosmetics retailer Lush authenticates with ease

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how Lush has modernised authentication, governed by a desire to care for customer data. We talk to Nasa's CDO about data as a strategic asset. And we foreground a call for the government and the Post Office to compensate Horizon victims without delay. Read the issue now.

  • Computer Weekly - 29 June 2021: Is the UK government planning to rewrite GDPR?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a government taskforce on post-Brexit regulations has recommended changes to GDPR in the UK – we examine the implications. The NHS has launched a new data strategy - we look at what it means for your medical records. And we ask how to avoid the performance problems that affect private cloud. Read the issue now.

  • Computer Weekly – 27 March 2018: The desktop is changing

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, corporate PCs haven't changed much in 20 years – as use of Chrome OS grows, we ask if IT leaders are ready for a new approach. Theresa May said Brexit means the UK leaving the EU digital single market – does this mean a return to roaming charges? And we look at the latest developments in Linux. Read the issue now.

  • The Splunk Guide to SIEM Replacement

    Sponsored by: Splunk

    Replacing a SIEM is a major decision for an organization. And now more than ever, best-in-class security operations require a modern SIEM solution that will power the SOC of the future. This e-book will help answer key questions on your SIEM replacement journey. Read on now to learn how you can get started.

  • Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing

    Sponsored by: TechTarget ComputerWeekly.com

    Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.

  • CW Innovation Awards Telecommunications Winner: Telekom Malaysia

    Sponsored by: TechTarget ComputerWeekly.com

    Telekom Malaysia has been driving automation efforts across the company, not only to serve customers more efficiently, but also to improve a slew of back office functions. Learn more about why they are the telecommunications project of the year.

  • Computer Weekly – 7 May 2024: Casting a critical eye on HMRC's IR35 checker tool

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we investigate what has been going on with the HMRC's Check Employment Status for Tax (CEST). We also speak to the CIO of Danfoss about making datacentres greener and explore the issue of restoring data and system backups after a ransomware or cyber attack. Read the issue now.

  • Focus: Green datacentre

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a closer look at how the datacentre sector is taking steps to boost its environmental friendliness, and why.

  • Computer Weekly – 29 November 2016: Machine learning keeps customers happy at Ocado

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how data scientists at online grocer Ocado are using machine learning technology to deliver better customer service. Manufacturing giant GE is making a play to become a top 10 software supplier. And we examine the future of server operating systems as workloads move to the cloud. Read the issue now.

  • The State of AI at Work

    Sponsored by: Asana

    The rapid rise of AI is transforming the workplace. This in-depth report examines the opportunities and challenges of AI adoption, from productivity gains to literacy gaps. Discover the 5 stages of AI maturity and how to harness AI's potential. Read the full report to learn how to move your organization to AI excellence.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.