ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=30start=10start=30start=30start=30"

  • CIO Trends APAC: Developing a data-driven culture

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about what organisations in Asia-Pacific are doing to sharpen their data analytics strategies to cope with business demands in a challenging economic climate.

  • How To Modernize Your Data For A Resilient And Efficient Manufacturing System

    Sponsored by: T-Systems

    In this whitepaper, you’ll discover how advanced data management and data analysis technologies enable manufacturers to leverage their data treasures to increase the resilience of their manufacturing systems and supply chains and make them safe and secure for the future. Read on to learn how you can make the most of your manufacturing data.

  • AI tools for software developers: Part Two

    Sponsored by: TechTarget ComputerWeekly.com

    The Computer Weekly Developer Network is in the engine room, covered in grease and looking for Artificial Intelligence (AI) tools for software application developers to use. With so much AI power in development and so many new neural network brains to build for our applications, how should programmers 'kit out' their AI toolbox?

  • Computer Weekly – 11 October 2022: Government bins IR35 reforms – what you need to know

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after the government scrapped its IR35 reforms, we examine what IT contractors need to know. With hybrid working, employee experience is a priority – we look at how it meshes with customer experience initiatives. And we assess the options for unstructured data storage in the cloud and on-premise. Read the issue now.

  • CISO Success Stories: How security leaders are tackling evolving cyber threats

    Sponsored by: TechTarget ComputerWeekly.com

    The cyber threat landscape facing chief information security officers (CISOs) has morphed into a rapidly evolving beast, fuelled by the breakneck pace of digital transformation. In this e-guide, delve into the unique pressures faced by CISOs in technology and other industries, and how they are rising to the challenge.

  • GEP Spend Category Outlook 2024

    Sponsored by: GEP

    As it’s clear that the challenges plaguing the supply chain will not be going away any time soon, procurement must come up with ways that they can leverage new technology to combat these issues. But of these tools, which are the most effective? Browse this report to learn more.

  • September ezine: Thinking digital in the world of storage

    Sponsored by: MicroScope

    The full report of the recent MicroScope storage roundtable which discusses how cloud and GDPR has changed the industry

  • September ezine: Thinking digital in the world of storage

    Sponsored by: MicroScope

    The full report of the recent MicroScope storage roundtable discussing how cloud and GDPR has changed the industry

  • IT Organizations in a Quandary Over Visibility into Cloud Traffic

    Sponsored by: Gigamon

    Today, the push for the finalized IETF Transport Layer Security (TLS) 1.3 standard for network encryption continues to affect organization’s decisions. This white paper presents the key findings from a recent study conducted to investigate perceptions and beliefs of end users surrounding the adoption of the TLS 1.3 standard. Read on to learn more.

  • Three Steps to Authentic Connections in B2B

    Sponsored by: BrightTALK by TechTarget

    In today’s B2B marketplace, buyers no longer fall prey to one-size-fits-all marketing campaigns and pushy sales calls. Authenticity is key—and webinars and videos are key to achieving the human touch. They're also consistently ranked as the top performing content marketing tactics. Explore the 3 steps to authentic connections in B2B here.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.