ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=20start=30start=10start=20start=10start=10"

  • Detect, Investigate, and Respond: Reduce Financial Crime and Fraud in Financial Services

    Sponsored by: Splunk

    The Splunk Fraud and Crime Outcome Brief details how financial institutions can leverage Splunk's advanced data aggregation and machine learning capabilities to detect, investigate, and respond to financial fraud and crime.

  • How To Deploy A Password Policy

    Sponsored by: Specops Software

    This white paper provides an end-to-end guide for rolling out a new password policy in your organization. Learn how to plan, set up, deploy, and communicate the policy to keep your Active Directory secure. Download the white paper to get started.

  • Demise of Dead-End Demand

    Sponsored by: BrightTALK by TechTarget

    While classic demand gen funnels and SDR follow-ups can help marketing teams benchmark performance, many have begun to struggle with certain breakpoints. These issues can lead to dead-end demand, and unfortunately, many organizations struggle to combat this with modern B2B buying. Access this guide to learn more.

  • Smarter Ways To Modernize IT With Lenovo And AMD

    Sponsored by: Insight

    In this infographic, you'll discover smarter ways to modernize IT with Lenovo and AMD. You'll also find out how to address security, sustainability, performance, and transformation challenges. Read the full infographic now to learn more.

  • Proving ownership of IPv6 addresses

    Sponsored by: TechTarget ComputerWeekly.com

    In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.

  • How to achieve network infrastructure modernization

    Sponsored by: TechTarget ComputerWeekly.com

    Upgrading to advanced network infrastructure involves firms being able to deliver mission-critical services through cloud providers and through their own cloud resources. Increased network infrastructure capacity need has seen deployment of optical networking and advanced network solutions such as software-defined wide area network (SDWAN).

  • Public Sector Leaders Discuss IT Infrastructure

    Sponsored by: Red Hat

    In this e-book, join PeerSpot members who work in government and the public sector as they discuss why they selected Red Hat Enterprise Linux (RHEL) as their Linux distribution of choice.

  • From challenge to opportunity

    Sponsored by: ServiceNow

    This guide serves to dive into some of the HR and tech challenges today’s organizations have successfully overcome. Read on to learn how a unified digital platform can provide a simple, single brand experience for internal end-users, as well as how it can join up and simplify user experiences across technology silos and teams—and more.

  • Strategic Planning Done Right Creating And Delivering An Outcome-Driven Portfolio

    Sponsored by: ServiceNow

    Discover in this e-book how strategic portfolio management (SPM), a discipline that has strategic planning at its core, can help you overcome the strategic project gap by connecting all aspects of strategy, from the initial setting of priorities to the achievement of objectives.

  • Top Patient Engagement Technology for Remote Management of Chronic Disease

    Sponsored by: XtelligentMedia Healthcare

    Telehealth, remote patient monitoring, and patient-facing solutions like apps and the patient portal are essential to remote chronic disease management.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.