Search Results for "CW Special Reportstart%3D20start=30start=20start=10start=30"
-
IAM: Managing identity remains key to cyber security
Sponsored by: TechTarget ComputerWeekly.comIT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
-
A Computer Weekly buyer's guide to sustainable datacentres
Sponsored by: TechTarget ComputerWeekly.comThere is a growing need for datacentres to adapt to modern demands. In this 19-page buyer's guide, Computer Weekly looks at the new ideas coming from IT leaders looking to revamp datacentres, the importance of water usage in sustainability plans and the role uninterruptible power supplies have to play in decarbonisation
-
A Computer Weekly buyer's guide to sustainable datacentres
Sponsored by: TechTarget ComputerWeekly.comThere is a growing need for datacentres to adapt to modern demands. In this 19-page buyer's guide, Computer Weekly looks at the new ideas coming from IT leaders looking to revamp datacentres, the importance of water usage in sustainability plans and the role uninterruptible power supplies have to play in decarbonisation.
-
Liberate Data and Modernize your Network for AI and LLM with Aviatrix
Sponsored by: Aviatrix SystemsAviatrix's cloud networking platform enables enterprises to secure and optimize hybrid networks for AI and large language model workloads. It provides high-performance encryption, deep observability, and cost savings. Learn more about Aviatrix's cloud networking solutions.
-
Cracking the Buyer’s Journey with Intent Data
Sponsored by: TechTargetTake a look through this e-book to discover 5 significant changes in IT buyers’ behavior and how your organization can leverage intent data in order to improve your content for and outreach to those buyers.
-
Computer Weekly – 1 May 2018: Making music with AI
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at how artificial intelligence is being used in the creative industries such as music and books. TSB's IT meltdown is symptomatic of the tech challenges facing UK banks – we examine the issues. And our latest buyer's guide analyses the trends in big data. Read the issue now.
-
Domain Name System (DNS) Security
Sponsored by: CiscoSRM leaders must fully understand the FedRAMP program, its security levels, and the authorization process to make informed cloud security decisions. Verify CSP FedRAMP status and ask probing questions. Remember that using a FedRAMP-authorized cloud does not absolve security responsibilities. Read the full Gartner Research Report to learn more.
-
Computer Weekly – 29 November 2016: Machine learning keeps customers happy at Ocado
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how data scientists at online grocer Ocado are using machine learning technology to deliver better customer service. Manufacturing giant GE is making a play to become a top 10 software supplier. And we examine the future of server operating systems as workloads move to the cloud. Read the issue now.
-
A Finance Leader's Guide to Automating Analytics
Sponsored by: AlteryxIn this e-book, O’Reilly, a trusted content creator, explores the evolving role of CFOs and how they can do more with less. Read on now to learn how analytics automation can transform finance from manual, error-prone processes to fully automated systems with full visibility.
-
Enterprise Buyer’s Guide for Secrets Detection
Sponsored by: GitGuardianThis buyer's guide outlines 10 key considerations for choosing a secrets detection platform to secure your software supply chain. Learn how to gain complete visibility, implement effective detection, streamline remediation, and empower developers. Read the full guide to strengthen your secrets security posture.