ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"

  • CW APAC – Trend Watch: Datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    Sustainability targets are becoming more pertinent than ever. In this handbook, focused on datacentres in the Asia-Pacific region, Computer Weekly looks at how firms are approaching the topic, why STT GDC is building its largest datacentre in the Philippines, OVHCloud's India project and the impact of generative AI.

  • No deal Brexit: Ideal or Ordeal?

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.

  • Top trends shaping APAC's tech landscape in 2024

    Sponsored by: TechTarget ComputerWeekly.com

    While GenAI is not expected to supersede other IT priorities such as cloud, application development and cyber security, it will augment those areas by making it easier to build software and improve cyber resilience. In this round-up, we review some of the key IT trends that are likely to shape the industry across the region in 2024.

  • Shore up your cybersecurity resilience: A guide for ANZ businesses

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.

  • CIO Trends #10: Benelux

    Sponsored by: TechTarget ComputerWeekly.com

    If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes is a big one. Also find out how close autonomous ships are to regularly docking in Dutch ports. Read more about it in this issue of our CIO Trends Benelux series.

  • AI in Fraud Management: Uses cases, benefits and challenges

    Sponsored by: TechTarget ComputerWeekly.com

    AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.

  • Recap: Splunk.conf 18

    Sponsored by: TechTarget ComputerWeekly.com

    Download this e-guide for coverage of Splunk.conf 2018, looking into subjects such as security automation, data-driven pre-emptive maintenance and why diversity is so important when developing the technologies of the future.

  • Computer Weekly – 17 January 2023: How PepsiCo works with tech startups to drive growth

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to food and drinks giant PepsiCo, about how it works with tech startups to drive growth and digital transformation. Our latest buyer's guide examines the key elements of a composable business. And with all the chatter about ChatGPT, we look at the implications of generative AI. Read the issue now.

  • Computer Weekly - 31 March 2020: Can the internet take the strain?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as millions of people work from home, we examine the measures in place to make sure the internet stays up and running. Our latest buyer's guide looks at the best practice in application modernisation. And we find out how IT leaders are tackling the skills shortage to recruit the best tech talent. Read the issue now.

  • Manchester United praised for swift response to cyber attack

    Sponsored by: TechTarget ComputerWeekly.com

    The Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.