ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:ComputerWeekly.com

  • Computer Weekly – 26 February 2019: Delving into viewer data at the BBC

    In this week's Computer Weekly, we talk to the BBC about how the UK broadcaster is using data analytics to better understand its viewers and grow its audience. We look at how CERN is using IT automation in its quest to unravel the mysteries of the universe. And we examine the impact of GDPR on cloud storage. Read the issue now.

  • AI in the UK: The only way is ethics

    In this e-guide, we explore how enterprises must confront the ethical implications of AI use as they increasingly roll out technology that has the potential to reshape how humans interact with machines. We also shed a little light on the use of AI within politics - specifically through the controversial Brexit campaign.

  • Jargon Buster Guide to Container Security

    The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.

  • IT News Website Survey

    Interested in IT? Take part in our IT News Website Survey for a chance to win a £100 Amazon voucher.

  • Computer Weekly – 19 February 2019: When is it best to stick with paper?

    In this week's Computer Weekly, sometimes going digital is not necessarily the best thing to do – we weigh the pros and cons of paper versus technology. Our new buyer's guide examines the challenges of asset management as you move to the cloud. And we look at the growing role of software developers in the future of networking. Read the issue now.

  • CW Nordics February 2019

    In this ezine, we look at how digital transformation is shaking up the Nordic region and placing CIOs at the forefront of the social and economic changes that come with it. Norway, Denmark, Sweden and Finland are all heading in the same direction at pace and it appears this move is being fuelled by more traditional businesses.

  • Managing data breaches

    In this e-guide, read about the data breaches that have occurred across the region in recent years and the lessons you can learn to respond better to data breaches, which are all but inevitable at every organisation large and small.

  • Cloud migration tips

    In this e-guide, learn from the forerunners in cloud adoption and migration across ASEAN, what a cloud migration factory is, and how to build a cloud security strategy.

  • How to Plan for, Deploy, and Manage Multi-cloud Storage

    Does your company's 2019 planning include establishing a solid multi-cloud storage strategy? Should it? Should you be either considering multi-cloud deployment or in the throes of trying to manage the multi-cloud, we're sending you our 3-part e-book to help.

  • Computer Weekly – 12 February 2019: The Met Office storms ahead on data analytics

    In this week's Computer Weekly, how the Met Office takes 2TB of weather data every hour and turns it into useful business insight. We examine whether Amazon's presence in the retail market is putting off other retailers from using its public cloud services. And we look at the new 802.11ax wireless networking standard. Read the issue now.

  • The Future of Financial Services: Part 2

    In the second part of our 'Future of Financial Services' e-guide series, read about how the financial services industry is not just being shaken up with cosmetic changes, but is about to go through the process of being stripped down and rebuilt.

  • Take aim at network security

    In this e-guide, learn more about securing software-defined wide area networks, the top three network security challenges facing CISOs, and why network security remains primary in any truly comprehensive security strategy.

  • CW ASEAN – February 2019: Target storage problems

    In this month's edition of CW ASEAN, we uncover the state of adoption of storage analytics in ASEAN and what organizations can do to reap the full benefits of the technology.

  • CW ANZ – February 2019: Home in on storage minutiae

    In this edition of CW ANZ, we look at how organisations are using storage analytics to manage their storage footprint and what suppliers are doing to help enterprises get the most of out of the technology.

  • IoT in APAC

    In this e-guide, read more about Schneider Electric's experience with IoT in Indonesia, how Australia's Citic Pacific Mining is using the technology to track vehicles, and what the industry is doing to address IoT challenges in area such as security.

  • A Computer Weekly buyer's guide to perimeterless network security

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • CIO Trends #8

    In this e-guide, take a look at some of our most popular articles on issues faced by IT decision makers, such as how to create a strategy that works for the business in a digital age and tips on how to take advantage of opportunities to lead your organization to unprecedented success.

  • Computer Weekly – 5 February 2019: Technologies to support deep learning

    In this week's Computer Weekly, we look at the technologies needed to support deep learning and AI applications in your organisation. We hear about Southern Water's data management overhaul and the benefits achieved from centralising its data team. And we examine best practice in managing large-scale Docker implementations. Read the issue now.

  • CW Benelux ezine February 2019

    Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.

  • DevSecOps delivers better business

    Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.

  • Computer Weekly – 29 January 2019: A vintage digital transformation for Majestic Wines

    In this week's Computer Weekly, we examine the digital transformation of retailer Majestic Wines and find out how buying rival Naked Wines led to a cloud overhaul of the firm's IT. We look at the challenges for IT managers as they prepare for the end of Windows 7 support. And our buyer's guide discusses deep learning technology. Read the issue now.

  • The long march of S/4 Hana

    S/4 Hana, the ERP system built on SAP's in-memory, columnar database Hana has been on a long march through the enterprise since its launch in February 2013. In this e-guide, we discuss the pros and cons of upgrading to S/4 Hana, what the future has in store for the system and how its users are feeling about C/4 Hana integration.

  • Computer Weekly – 22 January 2019: Moving beyond network boundaries

    In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.

  • The changing mobile platform landscape

    So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.

  • Infographic: Public Cloud

    All you need to know about Public Cloud in one handy infographic. You're welcome.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.