Search Results for "CW Special Reportstart%3D20start=30start=20start=10start=30"
-
IAM: Managing identity remains key to cyber security
Sponsored by: TechTarget ComputerWeekly.comIT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
-
2024 global threat report
Sponsored by: CrowdStrikeThe advent of AI as a tool has lowered the barrier of entry for hackers, only adding fuel to the fire that is the rapidly expanding threat landscape. With this 2024 Global Threat Report, CrowdStrike’s elite Counter Adversary Operations team delivers actionable intelligence you can use to stay ahead of today’s threats. Read on to learn more.
-
Computer Weekly - 3 August 2021: The fears and benefits of virtualising reality
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the mingling of virtual and physical worlds and find positive applications and worrisome implications from augmented reality. We find out how to run a virtual hackathon during the pandemic – pizza still included. And we look at how to improve performance of your private cloud. Read the issue now.
-
3 Machine Learning Use Cases for Planning & Logistics
Sponsored by: AlteryxTired of relying on outdated forecasting methods and struggling to keep up with fluctuating customer demand? Download 3 Machine Learning Use Cases That Immediately Benefit Planning and Logistics Teams and start transforming your planning and logistics operations.
-
15 Reasons To Adopt Red Hat OpenShift Virtualization
Sponsored by: Red HatRed Hat OpenShift Virtualization offers a modern platform for virtual machines and container-based applications. Read this e-book to unpack the remaining reasons to migrate your traditional VMs to Red Hat OpenShift.
-
A guide to developing cloud applications using PaaS
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we look at the management and development tools that are required to build, deploy and operate cloud-native applications at scale.
-
IT Project: Migration to cloud
Sponsored by: TechTarget ComputerWeekly.comThe benefits of using cloud are well-known, but the challenges and barriers enterprises come up against during their move off-premise can be wide, varied and unexpected. Knowing how best to negotiate these issues can help speed up the process of shifting workloads and applications to the cloud immeasurably.
-
Evolving the Next Generation Telco with AWS
Sponsored by: AWSForward-thinking CSPs adopting cloud solutions have begun to transform their operations, leveraging the cloud's elasticity, scalability, agility, and security to enhance efficiency, productivity, and customer value. Download the eBook Now and start your journey towards an agile and efficient telecom operation with AWS.
-
Computer Weekly – 29 November 2016: Machine learning keeps customers happy at Ocado
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how data scientists at online grocer Ocado are using machine learning technology to deliver better customer service. Manufacturing giant GE is making a play to become a top 10 software supplier. And we examine the future of server operating systems as workloads move to the cloud. Read the issue now.
-
Safety Meshing: Hybrid trust models in social networks for end-to-end encryption
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.