ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=20start=30start=10start=20start=10start=10"

  • Customer Experience (Cx) Trends Customer Service Insights In The Genai Era

    Sponsored by: ServiceNow

    Discover in this e-book 5 revelations about today’s customer service experience that CX leaders need to prepare for in the GenAI era.

  • Accelerate sustainable manufacturing operations with the cloud

    Sponsored by: AWS

    From reducing waste to cutting down on water consumption, industrial companies worldwide are stepping up sustainability. This e-book explains how manufacturers are using Amazon Web Services to leverage cloud technology and accelerate their sustainability goals.

  • Managed IT and Security Guide

    Sponsored by: ARG, Inc.

    Whether you are concerned about skyrocketing cyberattack threats, debating a migration to the cloud or looking to enhance your talent pool, this e-book will answer all your questions. Download now to access your ultimate managed IT and security guide.

  • A Security Assessment of Android Full-disk Encryption

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.

  • 3 Stages For Optimizing It Services And Operations

    Sponsored by: Service Now x Agineo

    Unify IT services and operations on a single cloud platform to reduce costs, scale for growth, and deliver extraordinary experiences that drive better business outcomes. Read this white paper to discover a 3-stage approach for optimizing IT services and operations.

  • 3 stages for optimizing it services and operations

    Sponsored by: ServiceNow

    In this guide, discover a practical, 3-stage approach for automating and optimizing IT services and operations on a single cloud platform, giving you the ability to govern all things IT while efficiently delivering extraordinary technology experiences.

  • Developing A Strategy For Your Network Modernization

    Sponsored by: Cloudflare

    Evaluate the scope of your network modernization project, and consider key use cases like branch connectivity, protecting public-facing infrastructure, simplifying the corporate network, and connecting, and securing public clouds.

  • Computer Weekly – Dell Technologies aims for an intelligent, connected future

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as Dell and EMC complete the largest IT supplier merger in history, we look at the new company's strategy. Our latest buyer's guide examines a key aspect of using cloud – cloud bursting. And we assess the latest views on the UK government's plans for internet surveillance legislation. Read the issue now.

  • Secure Access Growth Opps

    Sponsored by: AT&T and LevelBlue

    Explore the latest report on Secure Access Service Edge (SASE) from Frost & Sullivan. Uncover key insights into why businesses are opting for Managed Security Service Providers (MSSP) and how a SASE unified cloud-based platform can drive operational efficiency and cost savings.

  • Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers

    Sponsored by: TechTarget ComputerWeekly.com

    In this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.