ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:TechTarget ComputerWeekly.com

  • 2022 UKI Media Consumption Study: Characteristics of the Buying Team

    In this infographic, we share insights on the ever-growing IT buying team and give practical advice on how to engage the whole purchasing team throughout a complicated buying process.

  • Best practices for container security in the data center

    Containers present unique security challenges and data centers must learn and adapt to those challenges. Although containers might present certain unfamiliar security risks, data center admins who work with them can learn several effective ways to keep their container environments safe.

  • Video conferencing security best practices

    The video conferencing tool plays a vital role in keeping employees connected and productive, but it can also become an attack target of miscreants. Here are 11 tips to help enterprises adapt to a video conferencing-enabled workforce and host remote meetings in a secure and private manner.

  • How to get started with SASE

    Implementing a SASE architecture can help increase operational efficiency, create a more consistent UX and improve security. But it does require planning. In this infographic, we look at seven simple steps that can help any organization begin to develop a roadmap to tackle SASE.

  • Infographic: DevOps vs. DataOps

    DevOps is a collaboration between the application development and IT operations teams. The emphasis of this approach is communication and cooperation, and it has bled into data operations in a process called DataOps. In this infographic, we explore the main differences between these two concepts and the benefits and challenges of each one of them.

  • Computer Weekly – 27 September 2022: Making digital a key ingredient at Mondelez

    In this week's Computer Weekly, we talk to snack giant Mondelez, the owner of Cadbury, about how AI and data are transforming its business. SAP is increasing support costs for the first time in years – we assess the impact on customers. And a Ukrainian tech CEO tells us how his company kept going despite the Russian invasion. Read the issue now.

  • Computer Weekly – 20 September 2022: A gold medal performance for networking

    In this week's Computer Weekly, we find out how the IT team behind the 2022 Commonwealth Games in Birmingham delivered a winning performance, how the centuries-old London insurance market is going digital, thanks to Lloyd's of London, and how low-cost high street stores succumbed to the inevitable and are going online. Read the issue now.

  • CW APAC: Trend Watch: Cloud networking

    In this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology's advantages and how networking and security might evolve in the future.

  • 9 Common Cryptocurrency Scams in 2023

    Even though cryptocurrency is a newer trend, thieves are using old methods to steal. Here are some of the common cryptocurrency scams to watch out for.

  • Computer Weekly – 13 September 2022: Source responsibly: Tech sector efforts to root out forced labour are failing

    In this week's Computer Weekly, we analyse the technology industry's failure to extirpate forced labour and slavery from its supply chains. We find out how cyber security firm Okta is rebuilding customer trust after a major security incident. And we discover how Caterpillar is modernising its data management. Read the issue now.

  • A Computer Weekly buyer's guide to satellite broadband

    High-speed internet connectivity has become an essential utility for much of the world's population. In this 16-page buyer's guide, Computer Weekly looks at what makes the industry largely recession-proof, the obstacles 5G's roll-out must overcome and how reductions in satellite costs have boosted space-borne projects and services' popularity.

  • 10 types of security incidents and how to handle them

    Cyberattacks are more varied than ever. Learn the key symptoms that signal a problem and how to respond to keep systems and data safe.

  • Computer Weekly – 6 September 2022: Out with the old at Asda

    In this week's Computer Weekly, we talk to Asda's CIO Carl Dawson about the supermarket's cloud-oriented renovation of its technology stack. We narrate the security woes at Twitter. And we examine best practices for data backup. Read the issue now.

  • CW Europe - September-November 2022: Why Russia could become the world's biggest market for illegal IT

    Faced with international sanctions and the departure of many global IT suppliers from Russia, companies there are seeking alternative, and sometimes illegal, routes to access IT products. Also read how new requirements are driving scientists and engineers in Europe back to the lab to start developing 6G technology.

  • A guide to continuous software delivery

    Software empowers business strategy. In this e-guide we explore how to deliver new software-powered functionality for continuous business improvement.

  • Women Who Code: How women are redefining the programming world

    In this webinar, hear from women coders and leaders of software development teams about their career journeys and what it takes to encourage more women to take up coding.

  • BrightTALK Professional Engagement Survey 2022

    BrightTALK wants to hear from you! We are conducting our annual survey and we'd love to learn about how you research industry topics and engage with content. This survey digs into how you keep up-to-date on industry trends, the type of content that interests you, and how you currently consume digital content.

  • A guide to where mainframes fit in the cloud

    Far from being legacy IT, the mainframe is a driving force in modern computing. In this e-guide we look at its place in cloud computing.

  • Computer Weekly - 23 August 2022: How digital technology rescued Merlin

    In this week's Computer Weekly, we talk to Merlin Entertainments – operator of Legoland and Alton Towers – about how digital saved the company when Covid shut its theme parks. We find out how data analytics can help to track greenhouse gas emissions. And Southern Water explains how data supports vulnerable customers. Read the issue now.

  • A Computer Weekly buyer's guide to customer and employee experience management

    Businesses are facing new challenges to meet the expectations of customers and employees. In this 14-page buyer's guide, Computer Weekly looks at the benefits of the experience economy, the customer service implications of always-on mobile users and how digital platforms can engage customers across all channels.

  • CW APAC: Trend watch: Enterprise resource planning

    In this handbook, focused on enterprise resource planning in the Asia-Pacific region, Computer Weekly looks at what's behind this renewed priority and why firms want cheaper software maintenance and the benefits of best-of-breed cloud apps.

  • 2022 BrightTALK Professional Engagement Survey

    BrightTALK wants to hear from you! We are conducting our annual survey and we'd love to learn about how you research industry topics and engage with content. This survey digs into how you keep up-to-date on industry trends, the type of content that interests you, and how you currently consume digital content.

  • Computer Weekly – 16 August 2022: Broadband reaches for the stars – the new space race

    In this week's Computer Weekly, we look at the latest space race, as satellite firms compete to provide high-speed connectivity. Is the datacentre sector hindering house building in the UK? We find out what's really going on. And we talk to the IT director of the Mercedes Formula One team about how data helps to win races. Read the issue now.

  • Top 12 most commonly used IoT protocols and standards

    Researchers estimate the number of IoT connections will reach 30.9 billion by 2025. Nowadays, IoT protocols are as critical to the existence of IoT as the things themselves. Technologists can select from multiple communication protocols when building a network to serve their IoT ecosystem. In this infographic, we list the most common ones.

  • 7 best practices for Web3 security risk mitigation

    Web3 is a fast-growing, but hotly debated, tech movement. Tech builders and businesses must take a proactive approach to security when evaluating Web3's potential. In this infographic, we point out seven best practices for Web3 risk mitigation to help leaders keep their network safe.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.