ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"

  • The CTO's Guide to AI Project Budgeting

    Sponsored by: Shakudo Inc.

    In this white paper, you'll discover how to calculate the true costs and expected ROI of your AI initiatives. This guide covers common budgeting mistakes, tips to manage costs, and a framework to measure outcomes. Read on now to learn how a data and AI platform can help reduce expenses and accelerate your AI projects.

  • CW Nordics - May-July 2022: How the Estonian government created a digital assistant to support citizens

    Sponsored by: TechTarget ComputerWeekly.com

    As Estonia finalises the initial version of its government services digital assistant for launch, the man heading the project describes the birth of Bürokratt and beyond. Also read about Helsinki's role in a pan-EU project to introduce drone technology into emergency medical services.

  • All-Flash: The Essential Guide

    Sponsored by: TechTarget ComputerWeekly.com

    This guide offers a comprehensive survey of the all-flash array market. We look at all-flash products from the big six storage vendors and the startups and specialists. Plus, we give the lowdown on all-flash vs hybrid flash arrays and all-flash vs server-side PCIe SSD.

  • 4 IT Automation Myths Dispelled

    Sponsored by: Red Hat

    Read this e-book to learn how to overcome practical barriers to holistic automation adoption within your organization. Coverage includes automation goal setting, common myths, how to unite teams and training, and scaling automation across the business.

  • CW EMEA: Keeping across the rules

    Sponsored by: TechTarget ComputerWeekly.com

    Saudi Arabia made a statement of intent back in 2017 that it would build an entirely new city that would be smart from the start. We go deeper to find out how the project is shaping up.

  • Biometrics in the enterprise: An opportunity or an ethical minefield?

    Sponsored by: TechTarget ComputerWeekly.com

    Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.

  • Computer Weekly – 15 November 2022: How to protect against ransomware attacks

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how to prepare for and protect against ransomware, and what to do if you're hit by an attack. We gauge industry reaction to Ofcom's plan to investigate the big three cloud providers. And we find out how travel giant TUI is implementing self-service analytics. Read the issue now.

  • CW ANZ - December 2018: Rise to cloud and data management challenges

    Sponsored by: TechTarget ComputerWeekly.com

    In this edition of CW ANZ, we look at how enterprises in ANZ are approaching data management in the cloud, and some of the best practices that they can adopt to address cloud related challenges.

  • Top 10 artificial intelligence stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    According to Gartner's 2019 CIO Agenda survey, organisations that have deployed artificial intelligence (AI) grew from 4% to 14% between 2018 and 2019. These are Computer Weekly's top 10 AI articles in 2019.

  • CW EMEA - January 2023: Protecting the privacy of schoolchildren

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.