ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:TechTarget ComputerWeekly.com

  • CW APAC April 2023 – Trend Watch: Business applications

    Tech's role in the workplace continues to grow. In this handbook, focused on business applications in the Asia-Pacific region, Computer Weekly looks at industry cloud platforms, how microservices improve customer experience, what automation brings to banking and Rimini Street's approach to third-party support

  • 10 data lake uses for enterprises

    Data lakes have become an essential tool for the modern data management platform. They provide a scalable and cost-effective platform for storing and managing large volumes of data, and they support real-time data analysis and processing. This infographic highlights ten cases in which data lakes are critical for modern data management.

  • 2023 IT Priorities APAC Report

    IT leaders across APAC remain bullish about IT spending despite macroeconomic headwinds as they continue to invest in strategic areas such as cyber security, automation and cloud computing to bolster their digital chops.In this e-guide, read more about the findings revealed by the latest TechTarget/Computer Weekly IT Priorities 2023 study.

  • Infographic: IT Priorities 2023 APAC Budget and Buying Patterns

    Each year, Computer Weekly asks IT decision-makers what projects they have planned for the coming year and this year's results show that IT leaders across APAC remain bullish about spending despite macroeconomic headwinds as they continue to invest in strategic areas. Download this infographic to find out more about the results.

  • Computer Weekly – 4 April 2023: Revitalising UK digital government

    In this week's Computer Weekly, as the UK plummets down the international rankings for digital government, can its £400m identity system revitalise the UK's digital strategy? Read the issue now.

  • Video: IT Priorities 2023 APAC

    Over half of respondents in this year's IT Priorities study have bigger IT budgets as they continue to make strategic investments in cyber security, cloud and automation. In this video, hear from TechTarget's APAC editor in chief on the top priorities of organisations and the major tech trends that are shaping IT buying decisions in the region.

  • Will data centers become obsolete?

    Many organizations want to simplify or scale down their data centers -- but they won't disappear. Admins can examine as-a-service options and cloud to offload some applications.

  • A Computer Weekly buyer's guide to data visualisation

    Data visualisation is proving its value throughout a period of economic uncertainty. In this 16-page buyer’s guide, Computer Weekly looks at the rise of embedded analytics, the advantages of real-time data and Siemens’ exploration of industrial metaverse use cases

  • Computer Weekly – 28 March 2023: Is TikTok really a security threat to your business?

    In this week's Computer Weekly, with the UK government becoming the latest administration to ban TikTok, we ask whether the controversial social media app is really a security threat to enterprises. Read the issue now.

  • Centralized vs. decentralized identity management explained

    In this article, learn about centralized vs. decentralized identity management, as well as the advantages and disadvantages of each from two viewpoints: organizations that want to verify user identities and individuals that want to access organizations' resources and services.

  • 4 ChatGPT cybersecurity benefits for the enterprise

    As the technology matures and improves, expect to see the following beneficial ChatGPT cybersecurity use cases emerge in the enterprise.

  • White box networking use cases and how to get started

    Rising cloud costs have prompted organizations to consider white box switches to lower costs and simplify network management. In this article, learn more about white box networking and its main uses.

  • What's all this talk about data mesh?

    Data mesh is a new approach aims to make data more accessible, usable and valuable to the organization by creating a more flexible, scalable and collaborative data architecture. In this article, we point out some of the benefits and challenges of data mesh, and how to set up the right culture and infrastructure to make the most of this approach.

  • 12 top enterprise risk management trends in 2023

    Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.

  • 8 green computing best practices

    The overall amount of energy used in data centers is massive: the International Energy Agency (IEA) estimated that data centers used up to 1.3% of the electricity consumed worldwide in 2021. Here are eight green computing practices to make data centers more energy-efficient and sustainable, with both environmental and business benefits.

  • Computer Weekly – 21 March 2023: The risks of an imbalance in AI

    In this week's Computer Weekly, a leading AI expert explains the risks of an arms race in artificial intelligence caused by the domination of private sector providers. Our latest buyer's guide examines ways to reduce IT's energy use. And we analyse the latest damning revelations from the Post Office scandal inquiry. Read the issue now.

  • Business email compromise prevention tips

    It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.

  • 6 user authentication types to secure networks

    The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.

  • CW APAC: Buyer's guide to SASE

    Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.

  • Computer Weekly – 14 March 2023: Digital dedication – the transformation of Guinness World Records

    In this week's Computer Weekly, we find out about the digital transformation at Guinness World Records – dedication, that's what you need. We examine the new space race – to launch low-orbit, low-cost communications satellites. And we look at the role of technology in sustainability strategies. Read the issue now.

  • Infographic: Business email compromise red flags

    Business Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.

  • Comparing Azure Active Directory options

    Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.

  • Computer Weekly – 7 March 2023: Can the UK keep its fintech crown?

    In this week's Computer Weekly, two years after the Kalifa report laid out a roadmap for continued fintech sector growth, UK entrepreneurs and startups are worried about the lack of progress. We look at the top tech trends in retail and find out which companies are leading the way. And we examine six ways to slash IT emissions. Read the issue now.

  • CW EMEA - April 2023: Under attack and stressed out

    In this month's CW EMEA, we look at how cyber attacks are taking a toll on security professionals, damaging their mental health and forcing some to quit. We also look at Finland's allure for tech entrepreneurs, how software is enabling a new business model for a Swedish car manufacturer, and the importance of backup testing. Read the issue now.

  • A Computer Weekly buyer’s guide to green tech for business

    Business has a vital role to play in the wider push for sustainability. In this 14-page buyer's guide, Computer Weekly looks at what the private sector can do, how firms can remain competitive while sticking to green targets and digital tech's role in decision-making.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.