Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"
-
CW ASEAN: Trend Watch – Security
Sponsored by: TechTarget ComputerWeekly.comArtificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.
-
Why you should have a disaster recovery testing plan in place
Sponsored by: TechTarget ComputerWeekly.comWith this guide, gain a better understanding of why a disaster recovery testing plan is important, how to efficiently conduct tests, and some tools and terms that you will encounter along the way.
-
Build modern applications on AWS
Sponsored by: AWSInnovation, customer satisfaction, and operational efficiency are top priorities for businesses worldwide. For software companies, this means finding new ways to reduce costs, drive productivity, and speed up application development. This eBook details three tested and sustainable routes for modern application development in your business.
-
Microsoft Azure Red Hat OpenShift Provides More Value And Support To Cloud-First Organizations
Sponsored by: Red HatAzure Red Hat OpenShift provides a comprehensive container application platform that reduces infrastructure management effort by 50% and development time by 65%. Download this full Forrester Total Economic Impact report to learn how this managed service can increase your organization's cloud agility and innovation.
-
All Flash Is the Key to Efficient, Agile Storage
Sponsored by: Pure StorageAs data growth accelerates, organizations need efficient, agile all-flash storage to meet demands. Explore how all-flash storage can reduce costs, improve sustainability, and simplify management in this S&P Global report.
-
Deep learning for countering energy theft – a hybrid long-short term memory approach
Sponsored by: TechTarget ComputerWeekly.comEnergy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.
-
White box networking use cases and how to get started
Sponsored by: TechTarget ComputerWeekly.comRising cloud costs have prompted organizations to consider white box switches to lower costs and simplify network management. In this article, learn more about white box networking and its main uses.
-
Computer Weekly - 11 May 2021: Chip supply shortages are hitting hard
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, a shortage of semiconductors is affecting industries beyond just IT – we examine the implications. We talk to the CIO of pharmacy chain Boots about how tech helped in being an essential retailer during lockdown. And we look at the prospects for young people entering the IT sector post-pandemic. Read the issue now.
-
Computer Weekly – 22 October 2024: Delivering Olympic IT
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we speak to a former Olympian and CIO of the Paris 2024 Olympic and Paralympic Games about continuous improvement. We also look at new enterprise AI services from major IT providers and assess the unified communications as a service market. Read the issue now.
-
Computer Weekly - 14 December 2021: The rules for a safer internet
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.