Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"
-
Reimagine Retail and Consumer Goods Innovation with Generative AI
Sponsored by: Amazon Web ServicesLearn how industry leaders like adidas and OfferUp improve insights, elevate experiences, increase efficiency, and fuel growth using next-generation technologies. Read the ebook and start your generative AI journey with AWS today.
-
Reimagine Retail and Consumer Goods Innovation with Generative AI
Sponsored by: Amazon Web ServicesRetail and consumer goods companies of all sizes are getting started with generative artificial intelligence (GenAI). To capitalize on its potential, in this e-book you’ll explore 4 important retail and consumer goods GenAI use cases that are most relevant to your business.
-
Computer Weekly – 29 November 2016: Machine learning keeps customers happy at Ocado
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how data scientists at online grocer Ocado are using machine learning technology to deliver better customer service. Manufacturing giant GE is making a play to become a top 10 software supplier. And we examine the future of server operating systems as workloads move to the cloud. Read the issue now.
-
IAM: Managing identity remains key to cyber security
Sponsored by: TechTarget ComputerWeekly.comIT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
-
20 Ways to Boost Your MSP’s Productivity, Efficiency & Profitability With Auvik
Sponsored by: Auvik Networks, Inc.In this 17-page e-book, discover 20 ways that you can enhance productivity and profitability at your MSP.
-
Practical Zero Trust Implementing Protections for High-Value Data
Sponsored by: Zentera Systems Inc.This e-book offers a model for implementing a Zero Trust security strategy to protect high-value data. Learn to apply Zero Trust principles like segmentation, identity-based access, and continuous monitoring to secure sensitive information. Download the e-book for practical examples and a software-based approach to Zero Trust.
-
A guide to developing cloud applications using PaaS
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we look at the management and development tools that are required to build, deploy and operate cloud-native applications at scale.
-
CW APAC - June 2021: Career guide to cloud computing
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly looks at the skills required for cloud professionals to succeed in an evolving industry, the risk to jobs posed by automation and the disciplines being taught at Future Tech Academy
-
Decentralising datacentres: The new challenges of security at the edge
Sponsored by: TechTarget ComputerWeekly.comIn September 2020, the Computer Weekly Security Think Tank, our panel of information and cyber security experts, consideredthe challenges inherent in decentralising the datacentre, and set out to answer the question, how can security professionals ensure such setups are just as secure as the traditional centralised model? Read more in this e-guide.
-
Computer Weekly – 12 March 2024: From grassroots to Wembley – how tech supports English football
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to the CIO of The Football Association about how technology supports the national game from grassroots to the England teams. 5G Advanced is here – we report from MWC 2024 on the next steps for the mobile industry. And we examine the latest developments in the retail tech sector. Read the issue now.