ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"

  • Safety Meshing: Hybrid trust models in social networks for end-to-end encryption

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.

  • Using digital twins to cut costs and improve safety at Shell

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.

  • IT outsourcing in the digital age

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, discover how cloud computing continues to change the IT outsourcing industry, how Indian staff are making up a larger proportion of the workforces at large western companies, and find out how IT is disrupting the legal firms that support the outsourcing industry.

  • A Computer Weekly buyer's guide to sustainable datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    There is a growing need for datacentres to adapt to modern demands. In this 19-page buyer's guide, Computer Weekly looks at the new ideas coming from IT leaders looking to revamp datacentres, the importance of water usage in sustainability plans and the role uninterruptible power supplies have to play in decarbonisation.

  • A Computer Weekly buyer's guide to sustainable datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    There is a growing need for datacentres to adapt to modern demands. In this 19-page buyer's guide, Computer Weekly looks at the new ideas coming from IT leaders looking to revamp datacentres, the importance of water usage in sustainability plans and the role uninterruptible power supplies have to play in decarbonisation

  • Computer Weekly - 3 August 2021: The fears and benefits of virtualising reality

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the mingling of virtual and physical worlds and find positive applications and worrisome implications from augmented reality. We find out how to run a virtual hackathon during the pandemic – pizza still included. And we look at how to improve performance of your private cloud. Read the issue now.

  • Top 10 cloud stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Adopting a hybrid-centric or multicloud strategy is increasingly becoming the favoured approach for many enterprises, including those operating in verticals that were previously sceptical or too tightly regulated to consider moving to the cloud in the past. Here's a look back over Computer Weekly's top 10 cloud stories of 2019.

  • Computer Weekly – 4 October 2022: Putting APIs to work

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.

  • Jargon Buster Guide to Post Quantum Cryptography

    Sponsored by: TechTarget ComputerWeekly.com

    This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.

  • Top 14 ransomware targets in 2023 and beyond

    Sponsored by: TechTarget ComputerWeekly.com

    According to a 2022 global survey, two in three organizations suffered a ransomware incident in the previous 12 months, up 78% over the previous year. In this article, we take a look at the 14 top ransomware targets by sector, based on the Sophos survey and other data.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.