ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=30start=10start=30start=30start=30"

  • From Blockchain to IoT, the latest tech trends in logistics

    Sponsored by: TechTarget ComputerWeekly.com

    Delivering physical products to a customer base that today, for many businesses, spans the globe is a huge industry in itself. In this e-guide we look at the technologies that the businesses that operate in the logistics sector are investing in. As the headline suggests, Blockchain and the Internet of Things technologies are amongst them.

  • Transform Your Business With A Trusted Cloud Partner

    Sponsored by: Virtusa

    To achieve the desired outcomes of a cloud migration, organizations must create a detailed strategy that identifies the most efficient path to modernization. In this e-book, you’ll discover a streamlined approach to migration designed to ensure a smooth, effective cloud transition. Read on to learn how you can make the most of your migration.

  • The Modern IT Professional’s Guide To Shadow IT

    Sponsored by: Auvik Networks, Inc.

    Unapproved tools put organizations at risk. Learn how to govern, identify, protect, detect, respond, and recover from shadow IT. Read this white paper for a comprehensive plan to shed light on the shadows – also inside, find a self-assessment quiz that helps you determine your risk factor.

  • 2024 Data Engineering Trends & Predictions

    Sponsored by: Monte Carlo Data

    The data space moves quickly. In this e-book, you’ll discover 11 of the most important trends that are poised to shake up the data engineering landscape this year, including data contracts, cost optimization, the evolution of modern data, and 8 more. Read on to learn how data engineering will evolve in 2024.

  • A Computer Weekly buyer's guide to compliance, risk and governance

    Sponsored by: TechTarget ComputerWeekly.com

    Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach

  • The rise of edge computing

    Sponsored by: TechTarget ComputerWeekly.com

    The growing momentum around 5G has spurred the rise of edge computing applications designed to crunch and process data at the edge of the network. In this e-guide, read more about edge computing developments in the Asia-Pacific region, as well as the pros and cons of adding edge computing to a cloud architecture

  • A Computer Weekly buyer's guide to supply chain security

    Sponsored by: TechTarget ComputerWeekly.com

    Organisations are increasingly taking the initiative when it comes to firming up their supply chain security. In this 15-page buyer's guide, Computer Weekly looks at data's role in enabling faster response times, the challenges firms face in increasing their cyber resilience and how the role of the IT security leader has evolved.

  • CW Europe - June-August 2022: Russia escalates cyber war on Ukraine

    Sponsored by: TechTarget ComputerWeekly.com

    Microsoft has given details of cyber attacks on Ukrainian civilian communications, nuclear safety authorities, and the exploitation of the destruction of Mariupol in a phishing campaign.

  • CW Europe - September-November 2022: Why Russia could become the world's biggest market for illegal IT

    Sponsored by: TechTarget ComputerWeekly.com

    Faced with international sanctions and the departure of many global IT suppliers from Russia, companies there are seeking alternative, and sometimes illegal, routes to access IT products. Also read how new requirements are driving scientists and engineers in Europe back to the lab to start developing 6G technology.

  • Cost of a Data Breach Report 2024

    Sponsored by: IBM

    The Cost of a Data Breach Report 2024, delivers essential insights to help security and IT teams better manage risk and limit potential losses. Among the top results in this year's research, conducted by Ponemon Institute and analyzed by IBM, you will find insights and new ways you can mitigate risk. Dig into the report to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.