ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=20start=30start=10start=20start=10start=10"

  • Computer Weekly – 15 October 2024: A future of virtual collaboration

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how immersive technologies such as augmented and virtual reality are set to transform workplace collaboration. We look at how AI is helping to deliver improvements in customer experience. And we analyse the problems in the Post Office project to replace its troubled Horizon IT system. Read the issue now.

  • Computer Weekly – 16 April 2019: Digital transformation at the Crown Prosecution Service

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how the Crown Prosecution Service is helping to digitally transform the UK justice system. We report from Google's cloud conference on the firm's plans to expand its presence in enterprise IT. And we look at the opportunities and challenges of using AI in the education sector. Read the issue now.

  • A Computer Weekly e-Guide to IAM

    Sponsored by: TechTarget ComputerWeekly.com

    We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.

  • The Total Economic Impact™ Red Hat Enterprise Linux On Microsoft Azure

    Sponsored by: Red Hat

    Forrester Consulting's Total Economic Impact™ study shows Red Hat Enterprise Linux on Microsoft Azure delivers 192% ROI, $7.85M NPV, and a less than 6-month payback. Key benefits include improved business continuity, reduced data center costs, reallocated IT FTE time, and legacy solution consolidation. Download the full report to learn more.

  • SAP GRC Framework Integration with One Identity Manager

    Sponsored by: One Identity

    Built in line with the SAP governance risk and compliance (GRC) Framework, One Identity Manager enables organizations to maintain a complete picture of all deployed and connected systems by reading and writing to the connected systems via connectors. Download the white paper to learn more about One Identity Manager.

  • UX is the great enabler of public sector digitisation

    Sponsored by: Ensono Limited

    In this white paper, take a close look at how the public sector can put the citizen at the heart of plans for digitization and identity management and create flexibility and robust solutions for the future.

  • The Next Destination For Manufacturing: A Cloud-Based MES

    Sponsored by: GE Vernova & AWS

    Discover how a cloud-based manufacturing execution system (MES) can transform your operations. Gain real-time insights, reduce costs, and scale faster with GE Vernova's Proficy® Software and Services on AWS. Read the e-book to learn more.

  • IAM: Key to security and business success in the digital era

    Sponsored by: TechTarget ComputerWeekly.com

    As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.

  • Focus: Enterprise digital transformation

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at how businesses can stay on track through collaboration, innovation, listening to user needs and partnering with suppliers.

  • CrowdStrike outage explained: What happened and what can we learn?

    Sponsored by: TechTarget ComputerWeekly.com

    A botched content update released by CrowdStrike in July 2024 led to a massive IT outage affecting about 8.5 million Windows systems worldwide. In this e-guide, learn more about how the outage occurred, its impact on organisations around the globe, and what you can do to mitigate the risks of similar incidents in future.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.