ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:TechTarget ComputerWeekly.com

  • 2022 UKI Salary Survey - Diversity Infographic

    We take a look at our 2022 Salary Survey results from respondents who work in the UKI IT sector. In this exclusive  Infographic, we will be breaking down the current diversity landscape residing in the UK tech sector.

  • 2022 UKI Salary Survey - Salaries Infographic

    We take a look at our 2022 Salary Survey results from respondents who work in the UKI IT sector. We will be breaking down which job function gets paid what and how much salaries increased during the past year.

  • CW Nordics - May-July 2022: How the Estonian government created a digital assistant to support citizens

    As Estonia finalises the initial version of its government services digital assistant for launch, the man heading the project describes the birth of Bürokratt and beyond. Also read about Helsinki's role in a pan-EU project to introduce drone technology into emergency medical services.

  • CW APAC, May 2022: Trend Watch: Datacentres

    In this handbook, focused on datacentres in the Asia-Pacific region, Computer Weekly looks at the shift towards colocation facilities.

  • 2022 UKI Salary Survey - Pandemic Infographic

    We take a look at our 2022 Salary Survey results from respondents who work in the UKI IT sector. We will be breaking down how the working arrangements changed after the pandemic, what influence had the pandemic on staffing changes and how employees' attitude towards their work environment has changed as a result of the pandemic.

  • Infographic: 2022 IT Salary Survey - Nordics Salaries

    TechTarget surveyed IT professionals in the Nordics about their careers and salaries. Find out in this infographic what the salaries are like for the IT professionals.

  • Infographic: 2022 IT Salary Survey - Benelux Salaries

    TechTarget surveyed IT professionals in Benelux about their careers and salaries. Find out in this infographic what the salaries are like for the IT professionals.

  • Infographic: 2022 IT Salary Survey - Middle East Salaries

    TechTarget surveyed IT professionals in the Middle East about their careers and salaries. Find out in this infographic what the salaries are like for the IT professionals.

  • Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware

    In this week's Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men's support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now.

  • Infographic: 6 information governance best practices

    Information governance can streamline an organization's data management, cut storage costs and ensure compliance, which are all critical for content management. Best practices, such as forming a committee, accounting for collaboration tools and creating reports, can guide the way.

  • APAC enterprises are reducing their datacentre footprint

    Enterprises across the Asia-Pacific region are planning to reduce their datacentre footprint, relying instead on colocation facilities to improve IT efficiency and connectivity to the growing number of cloud-based services that they have come to rely on.

  • How RPA and machine learning work together in the enterprise

    More enterprises have adopted RPA functions to automate rote, repetitive tasks, but sometimes they need more capabilities. Enter machine learning functions and the result is "intelligent automation" which, unlike RPA, can learn and adapt.

  • Infographic: 6 file transfer best practices

    File sharing is a critical everyday practice across the enterprise. The wide-scale adoption of IM and collaboration tools, as well as cloud-based file-sharing sites, has made the process of sharing data easier -- but also less secure -- than ever. Here are six secure file transfer best practices to avoid exposing confidential data.

  • 2022 India Salary Survey - Future Work Infographic

    The results are in for the 2022 Career and Salary Survey. With over 800 respondents who work in the Indian IT sector, this infographic will give you a snapshot of what was the impact of the pandemic on IT staff, how working arrangements have changed and which topics have become a life priority for those working in tech.

  • 2022 ASEAN Salary Survey - Future Work Infographic

    The results are in for the 2022 Career and Salary Survey. With over 300 respondents who work in the ASEAN IT sector, this infographic will give you a snapshot of what was the impact of the pandemic on IT staff, how working arrangements have changed and which topics have become a life priority for those working in tech.

  • 2022 ANZ Salary Survey - Future Work Infographic

    The results are in for the 2022 Career and Salary Survey. With over 200 respondents who work in the ANZ IT sector, this infographic will give you a snapshot of what was the impact of the pandemic on IT staff, how working arrangements have changed and which topics have become a life priority for those working in tech.

  • 2 types of endpoint encryption to protect data

    Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.

  • BlackCat emerges as one of the top ransomware threats

    After several notable ransomware attacks against major enterprises, the BlackCat gang is drawing the attention of security researchers who have connected it to other groups.

  • UKI 2022 Salary Survey Results

    In this e-guide: We take a look at our 2022 Salary Survey results from over 250 respondents who work in the UKI IT sector. We will be breaking down which job functions get paid what, what areas of IT companies will be investing in in 2022 and the current diversity landscape residing in the UK tech sector.

  • Computer Weekly – 3 May 2022: A prescription for digital accessibility at Boots

    In this week's Computer Weekly, millions of people have difficulties when using websites – we find out how Boots is making its e-commerce offering fully accessible. Our new buyer's guide examines communications as a service. And we talk to Trainline's CTO about how the rail app provider survived and thrived post-pandemic. Read the issue now.

  • How to choose an HR software system: A complete guide

    An HR system is one of the most important purchases an organization makes. Nowadays, the stakes couldn't be higher. The market for HR tools has exploded, and people management has become an urgent priority. In this e-guide, learn all the key steps to identify your needs and pinpoint the features that matter most.

  • How to become an artificial intelligence engineer, step by step

    Artificial intelligence engineers are in great demand and typically earn six-figure salaries. In this e-guide, learn what it takes to launch a rewarding career as an AI engineer, including required skills, responsibilities, qualifications, educational opportunities and top salaries.

  • 5 ways to reduce the cost of Kubernetes

    Cloud computing must support applications efficiently, and cost-effectiveness is a part of that. Unfortunately, many Kubernetes deployments focus on technical operations capabilities and fail to consider the costs associated with their benefits. Here are 5 tips to reduce the cost of Kubernetes.

  • Royal Holloway: Security evaluation of network traffic mirroring in public cloud

    This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.

  • Deep learning for countering energy theft – a hybrid long-short term memory approach

    Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.