Unified Communications Research Library

Powered by Bitpipe.com

All Research Sponsored By:ComputerWeekly.com

  • Research snapshot – BYOD in the UK

    BYOD is fast becoming a normal part of daily business life in the UK, this snapshot survey of 100 UK businesses by Vanson Bourne reveals.

  • Build for Change – the Risk of Customerpocalypse

    The enterprise must focus on how it engages customers and responds to their expectations, or face Customerpocalypse, writes Alan Trefler, in this extract from his book Build for Change.

  • Computer Weekly – 19 Aug 2014: Training school leavers could help organisations develop the IT skills they require and fill the growing skills gap

    While the latest GCE A-Level results suggest that more people than ever will go on to study science, technology, engineering and maths (Stem) courses at university, the IT industry is failing to attract enough new talent. An ageing workforce means there is a "demographic time bomb in IT".

  • CW Special Report on IBM

    This special 12-page report from Computer Weekly analyses the challenges facing IBM, its financial performance, the services it offers, its place in the IT market and its future strategy..

  • Computer Weekly – 12 August 2014: The rise of home automation

    In this week's Computer Weekly, we look at the latest developments in smart home technology and the opportunities it presents for businesses. Our new buyer's guide examines the options for setting up an enterprise app store. And we find out how in-store tracking technology could improve the retail experience for shoppers. Read the issue now.

  • CW Europe – August Edition

    The hype around data mining may have receded, but it remains a critical discipline for the data scientist. This issue of CW Europe looks at what exactly data mining is, how and when it is used – and why it should not be mistaken for business analytics.

  • Computer Weekly – 5 August 2014: Driving virtualisation into pole position in Formula One

    In this week's Computer Weekly, we find out how the Caterham F1 team has used virtualisation in its trackside technology to help race performance. We analyse how growing competition in the cloud market is affecting Amazon Web Services' dominant position. And we look at an emerging datacentre technology - silicon photonics. Read the issue now.

  • A Terrorists Utilisation of the Internet

    As the technological landscape continues to evolve, cyber-criminals and cyber-terrorists are utilsing the internet and web based tools to help carry out their attacks. In this essential guide, experts delve deeper into the current threat and its potential evolution. To learn more, simply participate in our brief Vulnerability Management Survey.

  • Baffled by managing digital identity?

    Download your exclusive edition of Computer Weekly Buyer's Guide to Managing Identity & Access to answer your questions regarding digital identity and the impact it has on your organisation. To access your complimentary guide please take our Identity and Access Management Survey. We look forward to hearing from you.

  • Network Management: In with the New, Out with the Old

    Networking departments are in the midst of a technological revolution. Download Computer Weekly's Buyer's Guide to Networks to discover how a network virtualisation movement intends to replace proprietary hardware controls with virtualised software equivalents. Simply take our brief Network Management Survey to get immediate access to the guide.

  • Learn everything you need to know about Business Tablets & their effect on the industry

    Access an exclusive copy of Computer Weekly Buyer's Guide to Business Tablets to get an inside look at the impact tablets are having on organisations. To get your complimentary edition to the guide please take our brief Email Security Survey to help us continue to deliver the most relevant and up to date information regarding the topic.

  • Are you using the right tablet device?

    Is your tablet device the right tablet device for your business? Participate in our Web Security Research Program to find out. Upon completion of the survey, you will get immediate access to Computer Weekly Buyer's Guide to Business Tablets, where CW reveals the ins-and-outs of the tablet devices on the market.

  • Challenges with Cloud Security?

    Cloud information security is an issue. Download an exclusive copy of Encryption in the Cloud & see why industry experts say that cloud encryption is the key to making cloud computing more attractive for potential users that are concerned with data security. To access this resource, simply take our brief Cloud Security Survey!

  • Participate in our Customer Experience and Customer Relationship Management Research Program!

    Access your copy of Improving the Customer Experience Through Technology to get an inside look at what CRM professionals are doing to maintain a single view of a customer's history and contact information & the importance of offering multiple communication points. Simply take our CEM & CRM survey to access your complimentary guide.

  • Under-represented and Undervalued

    In this presentation from Computer Weekly's Women in IT event, Gillian Arnold talks about the current skills crisis in the technology industry, and recruiting skills for a more diverse base into enterprises.

  • Computer Weekly – 29 July 2014: Going mobile in financial services

    In this week's Computer Weekly, in a highly-regulated sector such as financial services, enabling staff mobility is a challenge – we hear from IT leaders that have made it work. We ask why small businesses are so poorly prepared for cyber attacks. And we examine the key storage technologies in the Openstack cloud platform. Read the issue now.

  • Application data security risks on Android devices

    This article in our Royal Holloway Security Series argues that personal and sensitive application data stored on smartphones is not as secure as people think and looks at controls that can reduce the risk.

  • Security issues in Vanets

    This article in our Royal Holloway Security Series analyses the security risks of Vehicular ad-hoc networks (Vanets), an important component of intelligent transportation systems.

  • Memory corruption attacks

    This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.

  • Sharing knowledge to tackle online banking fraud

    This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.

  • Tactics to combat insider threat

    This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.

  • Integrated Talent Management

    This Independent analyst perspective into the integrated talent management systems market from Elearnity assesses the leading talent management suppliers.

  • Kicking off an e-health revolution

    It has been hailed as the next big thing for many years but, it is fair to say, e-health has failed to fulfill its potential. Issues around cost, ease of use and privacy have held back its adoption. Now, find out how Telefonica hopes to kick start the e-health revolution.

  • HR Tech Europe 2014 - European Conference & Expo

    HR Tech Europe is Europe's most important event on how software, technology systems and collaborative tools are bringing about surmountable change in the way people and organisations work. Register now to join us in Amsterdam on 23-24 October - download your 2 for 1 Discount code here!

  • Russia's answer to Silicon Valley

    The Russian government is investing in an ambitious project to create its own technology hub that they hope will go on to rival Silicon Valley. The billions of rubles of government money being invested on the outskirts of Moscow has the backing of several multinational technology companies IBM, SAP, Intel, Cisco and Siemens.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Unified Communications Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.