ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=30start=30start=10start=30start=20"

  • Computer Weekly – 23 June 2020: How the Chelsea Flower Show blossomed as an online-only event

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the digital team at the Royal Horticultural Society about delivering the first online-only Chelsea Flower Show. With all the talk about the consumer uses of 5G, we look at how it could benefit enterprise IT. And we examine the best practice in managing SAP systems during lockdown, Read the issue now.

  • Computer Weekly – 23 June 2020: How the Chelsea Flower Show blossomed as an online-only event

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the digital team at the Royal Horticultural Society about delivering the first online-only Chelsea Flower Show. With all the talk about the consumer uses of 5G, we look at how it could benefit enterprise IT. And we examine the best practice in managing SAP systems during lockdown, Read the issue now.

  • CW Nordics August 2016

    Sponsored by: TechTarget ComputerWeekly.com

    The Nordic countries are renowned for being home to thriving tech startup scenes so it is hardly surprising that IT is a disruptive force in the region.

  • CIO Trends #4: Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    Read analysis of some of the Nordic results from the Computer Weekly IT priorities survey for this year. Unsurprisingly, cloud computing is one of the biggest draws and more than half of CIOs in the region will spend more on cloud technologies this year than they did in 2016.

  • Attacker Economics

    Sponsored by: SailPoint Technologies

    Threat actors target privileged access to infiltrate systems, exfiltrate data, and disrupt operations. This infographic outlines the attacker economics behind these tactics and how an identity-first security strategy can improve cyber resilience. Read the full infographic to assess your identity security posture.

  • Computer Weekly – 19 January 2021: The UK's struggle with digital schooling

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the UK government's sudden decision to close schools left many unable to provide children with online schooling - we examine the home learning challenges. Cyber security experts give us their forecasts for 2021. And we find out how technology supports the work of the Guide Dogs charity. Read the issue now.

  • CW Benelux - May 2017: 3D printing on the rise

    Sponsored by: TechTarget ComputerWeekly.com

    Is blockchain the future of your IT department? Is the next Google on the rise? Access the May 2017 issue of CW Benelux to learn about the current state of 3D printing in relation to smart applications, cloud-based ID management for public cloud strategy, how to rally your staff for IT innovation, and more.

  • MicroScope – December 2019: Time for change

    Sponsored by: MicroScope

    In this issue, we ask experts how they're approaching digital transformation to meet customers demand, and we look at whether the actions of the user should reflect on the accountability of the cloud provider

  • Computer Weekly - 21 September 2021: The cities planning for ethical use of AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to tech leaders in Barcelona and London about a collaboration to ensure ethical use of AI in the era of smart cities. The UK government wants to reform data protection law – we assess the implications. And we examine the latest best practice in hybrid cloud. Read the issue now.

  • Cloud backup vs traditional backup

    Sponsored by: TechTarget ComputerWeekly.com

    Cloud backup vs. traditional backup is an important discussion. While the cloud backup market is soaring, traditional backup players may also have much to offer your organisation. In this e-guide we look over the advantages and disadvantages of both backup offers.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.