ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=30start=20start=10start=30"

  • IAM: Managing identity remains key to cyber security

    Sponsored by: TechTarget ComputerWeekly.com

    IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.

  • 2024 global threat report

    Sponsored by: CrowdStrike

    The advent of AI as a tool has lowered the barrier of entry for hackers, only adding fuel to the fire that is the rapidly expanding threat landscape. With this 2024 Global Threat Report, CrowdStrike’s elite Counter Adversary Operations team delivers actionable intelligence you can use to stay ahead of today’s threats. Read on to learn more.

  • Computer Weekly - 3 August 2021: The fears and benefits of virtualising reality

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the mingling of virtual and physical worlds and find positive applications and worrisome implications from augmented reality. We find out how to run a virtual hackathon during the pandemic – pizza still included. And we look at how to improve performance of your private cloud. Read the issue now.

  • 3 Machine Learning Use Cases for Planning & Logistics

    Sponsored by: Alteryx

    Tired of relying on outdated forecasting methods and struggling to keep up with fluctuating customer demand? Download 3 Machine Learning Use Cases That Immediately Benefit Planning and Logistics Teams and start transforming your planning and logistics operations.

  • 15 Reasons To Adopt Red Hat OpenShift Virtualization

    Sponsored by: Red Hat

    Red Hat OpenShift Virtualization offers a modern platform for virtual machines and container-based applications. Read this e-book to unpack the remaining reasons to migrate your traditional VMs to Red Hat OpenShift.

  • A guide to developing cloud applications using PaaS

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at the management and development tools that are required to build, deploy and operate cloud-native applications at scale.

  • IT Project: Migration to cloud

    Sponsored by: TechTarget ComputerWeekly.com

    The benefits of using cloud are well-known, but the challenges and barriers enterprises come up against during their move off-premise can be wide, varied and unexpected. Knowing how best to negotiate these issues can help speed up the process of shifting workloads and applications to the cloud immeasurably.

  • Evolving the Next Generation Telco with AWS

    Sponsored by: AWS

    Forward-thinking CSPs adopting cloud solutions have begun to transform their operations, leveraging the cloud's elasticity, scalability, agility, and security to enhance efficiency, productivity, and customer value. Download the eBook Now and start your journey towards an agile and efficient telecom operation with AWS.

  • Computer Weekly – 29 November 2016: Machine learning keeps customers happy at Ocado

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how data scientists at online grocer Ocado are using machine learning technology to deliver better customer service. Manufacturing giant GE is making a play to become a top 10 software supplier. And we examine the future of server operating systems as workloads move to the cloud. Read the issue now.

  • Safety Meshing: Hybrid trust models in social networks for end-to-end encryption

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.