ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:ComputerWeekly.com

  • CW Benelux - August-October 2022: Belgium seeks top tech talent

    The battle for the right IT staff to transform businesses is changing and recruiters and job-seekers need to be clued up. In this issue, a Belgium-based recruiter gives the lowdown on tech job-seeking. Also read why Dutch beer brewer Heineken has replaced more than 60 different HR systems with SAP SuccessFactors as its central HR system.

  • Predictive analytics gains evermore accuracy in guiding enterprises forward

    Predictive analytics can help businesses look for meaningful patterns in data, then build models that forecast what is likely to happen in the future.

  • A guide to developing cloud applications using PaaS

    In this e-guide we look at the management and development tools that are required to build, deploy and operate cloud-native applications at scale.

  • Retailers' tech response to consumers' increasingly online habits

    The past few years has seen an increase in online shopping as the pandemic shifted more consumers into the realm of e-commerce to purchase goods during lockdowns. In return, retailers have been investing in technology to meet the e-commerce demands of customers, and now as predictions suggest pandemic shopping habits are set continue.

  • Computer Weekly - 26 July 2022: Inside Russia's Ukraine information operations

    In this week's Computer Weekly, we get the inside track on Russia's disinformation operations attempting to spread propaganda and cyber threats about the invasion of Ukraine. Our new buyer's guide looks at customer and employee experience management. And we assess 10 top Kubernetes backup suppliers. Read the issue now.

  • A Computer Weekly buyer's guide to supply chain security

    Organisations are increasingly taking the initiative when it comes to firming up their supply chain security. In this 15-page buyer's guide, Computer Weekly looks at data's role in enabling faster response times, the challenges firms face in increasing their cyber resilience and how the role of the IT security leader has evolved.

  • Computer Weekly - 19 July 2022: Tracking the rise of homeworking across the UK

    In this week's Computer Weekly, homeworking has more than doubled in the UK due to the pandemic – we look at the regional differences. The pressure is growing on cyber security teams – we find out how to avoid staff burnout and lost talent. And we examine the role that tech startups play in the growth of Amazon Web Services. Read the issue now.

  • Buyer's guide to backup and recovery software

    In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.

  • Computer Weekly - 12 July 2022: The most influential people in UK technology

    In this week's Computer Weekly, we reveal the 50 most influential people in UK IT for 2022, and talk to the winner of the 12th annual UKtech50, National Cyber Security Centre CEO Lindy Cameron. Also, we take an in-depth look at the crisis in chip supply and what's needed to solve it. Read the issue now.

  • VoIP has never lost its voice: How to get the most out of your business communications

    In today's comms world, and especially with regard to hybrid working, a communications identity has now become a unified calling and collaboration endpoint, one which is part of a suite of business services spanning voice, security and network-as-a-service solutions to power the mobile workforce.

  • How TDCX is building a people-centric business

    Every digital tool deployed by TDCX is aimed at augmenting the performance and experience of its employees. In an interview with CW, Byron Fernandez, group CIO of TDCX, talks up the company's approach in ensuring its technology investments enhance employee experience, as well as the cyber security challenges in its human capital intensive business.

  • India gears up for 5G but challenges remain

    India's upcoming spectrum auction marks the start of larger-scale deployments of 5G in the subcontinent, but telcos will need to find a way to address high infrastructure costs and monetise their investments. Download the full article to understand what challenges the country will have to face on its journey to deploy 5G.

  • Inside Bendigo and Adelaide Bank's cloud journey

    With a strong DevOps culture, Australian bank has been moving its most important applications to the cloud in a journey that has already reaped returns. Download the full article to learn more about Bendigo and Adelaide Bank's cloud journey.

  • 7 steps of an SD-WAN implementation

    The benefits of software-defined WAN make many organizations interested in adopting it, but the implementation process can seem daunting. Enterprises can use this seven-step process as a guide to deploy a successful SD-WAN implementation.

  • 7 types of networks and their use cases

    A computer network is an interconnected system of devices, represented as network nodes, that share information, data and resources among each other. Not all networks are the same. In this e-guide, learn about the seven most common types of networks, their benefits and use cases.

  • The development of wired and wireless LANs in a hybrid work model

    Many companies have found that as they have begun to manage the return to offices for the first time since the first lockdown were introduced, the office environment and its demands are very different to a year ago. These different demands are seen in the development of wired and wireless local area networks (LANs).

  • Computer Weekly – 5 July 2022: How to get the right level of cyber insurance

    In this week's Computer Weekly, we look at how the market for cyber insurance is evolving and how to avoid buying the wrong level of cover. We find out what role hydrogen technologies could play in reducing datacentre carbon emissions. And we hear how a 125-year old bicycle maker is embracing digital innovation. Read the issue now.

  • How to achieve network infrastructure modernization

    Upgrading to advanced network infrastructure involves firms being able to deliver mission-critical services through cloud providers and through their own cloud resources. Increased network infrastructure capacity need has seen deployment of optical networking and advanced network solutions such as software-defined wide area network (SDWAN).

  • How enterprise networks use WAN virtualization

    Virtualization is the backbone of network management in modern enterprises. Surprisingly, in most enterprises, virtualization came to the WAN last, but it arrived with enormous sophistication. SD-WAN is the most common form of WAN virtualization. But virtual WAN strategies are evolving to include software-defined perimeter and cloud concepts.

  • 9 IpaaS use cases for the enterprise

    iPaaS has gained significant traction in recent years to provide a common foundation for many complex and diverse business integrations. IPaaS provides an array of readily available integrations with tools for users to assemble custom integrations and data flows. Here are 9 examples to help you understand how it all works.

  • Infographic: Vulnerability management vs. Patch management

    Although both patch and vulnerability management are intertwined, they differ in critical ways, and it's important to have tools and processes for executing both. Here's a deep dive into their differences, the important places they overlap and software options for automating them.

  • Computer Weekly – 28 June 2022: Why collaboration – not competition – is the key to IT sustainability

    In this week's Computer Weekly, as sustainability rises up the corporate agenda, IT leaders say more collaboration is needed to meet climate goals. Microsoft faces further calls for greater transparency over software tools used to monitor employees. And the cyber security industry warns over an increasing loss of talent. Read the issue now.

  • Royal Holloway: Investigating the security vulnerabilities and solutions for connected and autonomous vehicle technologies

    This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.

  • Tech career guide: Cyber security

    In this handbook, Computer Weekly looks at what it takes to make it in Asia-Pacific's cyber security industry.

  • Ultimate IoT implementation guide for businesses

    IT administrators and CIOs considering an internet of things (IoT) deployment must have a thorough understanding of what the IoT is, how it operates, its uses, requirements, tradeoffs and how to implement IoT devices and infrastructures. In this e-guide, learn the requirements and use best practices for a successful deployment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.