Unified Communications Research Library

Powered by Bitpipe.com

All Research Sponsored By:ComputerWeekly.com

  • A Terrorists Utilisation of the Internet

    As the technological landscape continues to evolve, cyber-criminals and cyber-terrorists are utilsing the internet and web based tools to help carry out their attacks. In this essential guide, experts delve deeper into the current threat and its potential evolution. To learn more, simply participate in our brief Vulnerability Management Survey.

  • Baffled by managing digital identity?

    Download your exclusive edition of Computer Weekly Buyer's Guide to Managing Identity & Access to answer your questions regarding digital identity and the impact it has on your organisation. To access your complimentary guide please take our Identity and Access Management Survey. We look forward to hearing from you.

  • Network Management: In with the New, Out with the Old

    Networking departments are in the midst of a technological revolution. Download Computer Weekly's Buyer's Guide to Networks to discover how a network virtualisation movement intends to replace proprietary hardware controls with virtualised software equivalents. Simply take our brief Network Management Survey to get immediate access to the guide.

  • Learn everything you need to know about Business Tablets & their effect on the industry

    Access an exclusive copy of Computer Weekly Buyer's Guide to Business Tablets to get an inside look at the impact tablets are having on organisations. To get your complimentary edition to the guide please take our brief Email Security Survey to help us continue to deliver the most relevant and up to date information regarding the topic.

  • Are you using the right tablet device?

    Is your tablet device the right tablet device for your business? Participate in our Web Security Research Program to find out. Upon completion of the survey, you will get immediate access to Computer Weekly Buyer's Guide to Business Tablets, where CW reveals the ins-and-outs of the tablet devices on the market.

  • Challenges with Cloud Security?

    Cloud information security is an issue. Download an exclusive copy of Encryption in the Cloud & see why industry experts say that cloud encryption is the key to making cloud computing more attractive for potential users that are concerned with data security. To access this resource, simply take our brief Cloud Security Survey!

  • Participate in our Customer Experience and Customer Relationship Management Research Program!

    Access your copy of Improving the Customer Experience Through Technology to get an inside look at what CRM professionals are doing to maintain a single view of a customer's history and contact information & the importance of offering multiple communication points. Simply take our CEM & CRM survey to access your complimentary guide.

  • Under-represented and Undervalued

    In this presentation from Computer Weekly's Women in IT event, Gillian Arnold talks about the current skills crisis in the technology industry, and recruiting skills for a more diverse base into enterprises.

  • Computer Weekly – 29 July 2014: Going mobile in financial services

    In this week's Computer Weekly, in a highly-regulated sector such as financial services, enabling staff mobility is a challenge – we hear from IT leaders that have made it work. We ask why small businesses are so poorly prepared for cyber attacks. And we examine the key storage technologies in the Openstack cloud platform. Read the issue now.

  • Application data security risks on Android devices

    This article in our Royal Holloway Security Series argues that personal and sensitive application data stored on smartphones is not as secure as people think and looks at controls that can reduce the risk.

  • Security issues in Vanets

    This article in our Royal Holloway Security Series analyses the security risks of Vehicular ad-hoc networks (Vanets), an important component of intelligent transportation systems.

  • Memory corruption attacks

    This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.

  • Sharing knowledge to tackle online banking fraud

    This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.

  • Tactics to combat insider threat

    This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.

  • Integrated Talent Management

    This Independent analyst perspective into the integrated talent management systems market from Elearnity assesses the leading talent management suppliers.

  • Kicking off an e-health revolution

    It has been hailed as the next big thing for many years but, it is fair to say, e-health has failed to fulfill its potential. Issues around cost, ease of use and privacy have held back its adoption. Now, find out how Telefonica hopes to kick start the e-health revolution.

  • Computer Weekly – 22 July 2014: Time to get serious about endpoint security

    In this week's Computer Weekly, with billions of devices joining corporate networks every year, our latest buyer's guide looks at endpoint security. IBM and Apple have announced plans to work together on corporate mobility – we analyse what the deal means for IT leaders. And we take an in-depth look at in-memory databases. Read the issue now.

  • Computer Weekly – 15 July 2014: Time for an upgrade? Why you should buy IT now

    In this week's Computer Weekly, as competitive pressures and new technologies drive down IT prices, we find out why now is a great time to buy IT. We examine why going digital means a different approach to IT management. And we hear the latest best practices for improving your customer engagement with IT. Read the issue now.

  • CW500 IN THE CITY - Jason Scott-Taggart

    Jason Scott-Taggart, head of IT service management at Worldpay looks at how Barclays met the challenge of implementing technologies to support mobility and flexible working.

  • Musings on data centres – volume 2

    Analyst Clive Longbottom discusses the key issues in managing and designing datacentres, in this series of 12 articles.

  • Computer Weekly – 8 July 2014: The most influential women in UK IT

    In this week's Computer Weekly, we reveal our annual list of the 25 most influential women in UK IT – female IT leaders making a difference to the digital economy. We look at how to integrate iPads into the corporate IT infrastructure. And we profile enterprise software upstart Workday as it challenges Oracle and SAP. Read the issue now.

  • Making the case for the cloud in common use airport technology

    This report from Amadeus looks at the business case for cloud computing in airports.

  • Women in Technology 2014

    Are women flourishing in IT ? Find out by downloading the Women in techology report from Computer Weekly and Mortimer Spinks.

  • Recommendations on rolling back government surveillance

    Four former seniors staff from the US electronic intelligence gathering agency, the NSA, put the case for reform.

  • Russia's answer to Silicon Valley

    The Russian government is investing in an ambitious project to create its own technology hub that they hope will go on to rival Silicon Valley. The billions of rubles of government money being invested on the outskirts of Moscow has the backing of several multinational technology companies IBM, SAP, Intel, Cisco and Siemens.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Unified Communications Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.