ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=20start=30start=10start=20start=10start=10"

  • Real-time analytics expands its business value compass

    Sponsored by: TechTarget ComputerWeekly.com

    As an authority cited in the lead article in this e-guide explains, for many businesses "real time" means more frequent business intelligence reporting or data model updating. And yet, as another article in this e-guide explains, many organisations lack the infrastructure and culture necessary to deliver the required data.

  • CW Middle East - October-December 2020: Egypt's datacentre plans take a step forward

    Sponsored by: TechTarget ComputerWeekly.com

    While it builds an IT services industry, Egypt is also investing in infrastructure and now plans to develop a datacentre industry. Read in this issue how, as part of this plan, Egypt's parliament has passed a data protection law.

  • Computer Weekly – 5 March 2019: Modernising IT at the Bank of England

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the Bank of England as it starts the modernisation programme for its core system. We look at the rise of DevSecOps and how it can help deal with increasingly complex security threats. And we examine the different approaches to storage for structured and unstructured data. Read the issue now.

  • MicroScope – December 2020: Reasons to be positive for 2021

    Sponsored by: MicroScope

    In this issue, discover why the continued digital transformation trend means 2021 is looking good for the channel. Also read how business processes can be optimised by adding artificial intelligence to the mix, and how the channel is looking at the challenge of sustainability

  • Embracing generative AI

    Sponsored by: Virtusa

    Generative AI is reshaping the workplace, and optimism abounds for its role in enhancing productivity and innovation. This report examines how successful implementations tackle challenges in training, organizational barriers, and governance. Access the full report for details.

  • Cisco ThousandEyes End User Monitoring: Third-party analysis

    Sponsored by: Cisco ThousandEyes

    This white paper examines the total economic impact of Cisco ThousandEyes End User Monitoring. Learn how ThousandEyes can help you secure remote access, improve productivity, and enhance IT efficiency. Read the full Forrester Total Economic Index to discover the benefits.

  • CW Middle East Jan to Mar 2018

    Sponsored by: TechTarget ComputerWeekly.com

    The Middle East is investing heavily in IT to make life better for its population. Smart city developments are an example. But read in this issue how in the Middle East, where there is a growing population and a rise in lifestyle-related disease, IT is being used to support the healthcare system.

  • A Computer Weekly buyer's guide to Threat Management

    Sponsored by: TechTarget ComputerWeekly.com

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

  • Computer Weekly – 19 July 2016

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.

  • CW Benelux August 2019: Dutch academic seeks the personality behind the cyber criminal

    Sponsored by: TechTarget ComputerWeekly.com

    There is at least one person behind every cyber attack, but beyond that insight, very little known is about them. Rutger Leukfeldt, senior researcher on cyber crime at the Netherlands Institute for the Study of Crime and Law Enforcement, has been trying to get inside the minds of hackers.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.