ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"

  • Raspberry PI with Java: programming the internet of things

    Sponsored by: TechTarget ComputerWeekly.com

    In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.

  • Focus: Agile DevOps

    Sponsored by: TechTarget ComputerWeekly.com

    Businesses in every industry are finding themselves under pressure to out-innovate their competitors, and push out new products and services to customers at an ever-increasing rate.

  • Architectural Design Decisions Directly Impact IT Agility For Pure Storage Flasharray And Flashblade Users

    Sponsored by: Pure Storage

    Early thinking about All-flash arrays (AFAs)— "higher performance at a higher price" — is an oversimplification that buyers cannot afford to make. In this white paper, take a close look at Pure Storage's alternative to the forklift upgrade, made possible by Pure's scale-up block and file product FlashArray.

  • Computer Weekly – 4 July 2017: Be better connected in a wireless world

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the latest developments in wireless technology and how to deliver secure and reliable wireless networks. We examine Microsoft's PowerShell scripting language to understand why it's such an important tool. And we ask CIOs what it's like to cross the divide and work for IT suppliers. Read the issue now.

  • Enhancing Healthcare Security: NIST Framework and Health Breach Notification Rule

    Sponsored by: XtelligentMedia Healthcare

    The collection of best practices and standards found in the NIST Cybersecurity Framework can help healthcare organizations improve their overall security postures.Vendors of personal health records, including health apps and other non-HIPAA-covered businesses, are subject to the Federal Trade Commission's Health Breach Notification Rule.

  • How APAC enterprises can scale up their AI initiatives

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a look into the main trends for AI deployment in APAC, what are the best strategies for enterprises that are looking to scale up their AI initiatives, and how APAC firms are using AI to increase innovation and optimise business processes.

  • The Skeptic’s Guide to Oracle Third-Party Support

    Sponsored by: Spinnaker Support

    This guide answers 15 common queries about third-party Oracle support, addressing legality, quality, response times, costs, and security. It offers facts and recommendations to assess if it suits your organization. Read the full eBook for more details.

  • Computer Weekly – 5 December 2023: Technologies to support hybrid working

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at technologies to support hybrid working – even when your business is as unique as farming. Read the issue now.

  • Top 5 insurance problems – and AI isn’t one of them

    Sponsored by: SAS

    This white paper explores how insurers can leverage AI and data to address their top challenges, from data chaos to hidden digital risk. Inside, you’ll learn how predictive analytics and cloud capabilities can help insurers shift from indemnification to loss prevention. Read the full white paper now to discover AI use cases that drive value.

  • CW APAC - February 2022: Trend Watch - enterprise 5G

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on enterprise 5G in the Asia-Pacific region, Computer Weekly looks at what the technology means for enterprises across the region.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.