ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=30start=20start=10start=30"

  • IAM: Managing identity remains key to cyber security

    Sponsored by: TechTarget ComputerWeekly.com

    IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.

  • A Computer Weekly buyer's guide to sustainable datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    There is a growing need for datacentres to adapt to modern demands. In this 19-page buyer's guide, Computer Weekly looks at the new ideas coming from IT leaders looking to revamp datacentres, the importance of water usage in sustainability plans and the role uninterruptible power supplies have to play in decarbonisation

  • A Computer Weekly buyer's guide to sustainable datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    There is a growing need for datacentres to adapt to modern demands. In this 19-page buyer's guide, Computer Weekly looks at the new ideas coming from IT leaders looking to revamp datacentres, the importance of water usage in sustainability plans and the role uninterruptible power supplies have to play in decarbonisation.

  • Liberate Data and Modernize your Network for AI and LLM with Aviatrix

    Sponsored by: Aviatrix Systems

    Aviatrix's cloud networking platform enables enterprises to secure and optimize hybrid networks for AI and large language model workloads. It provides high-performance encryption, deep observability, and cost savings. Learn more about Aviatrix's cloud networking solutions.

  • Cracking the Buyer’s Journey with Intent Data

    Sponsored by: TechTarget

    Take a look through this e-book to discover 5 significant changes in IT buyers’ behavior and how your organization can leverage intent data in order to improve your content for and outreach to those buyers.

  • Computer Weekly – 1 May 2018: Making music with AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how artificial intelligence is being used in the creative industries such as music and books. TSB's IT meltdown is symptomatic of the tech challenges facing UK banks – we examine the issues. And our latest buyer's guide analyses the trends in big data. Read the issue now.

  • Domain Name System (DNS) Security

    Sponsored by: Cisco

    SRM leaders must fully understand the FedRAMP program, its security levels, and the authorization process to make informed cloud security decisions. Verify CSP FedRAMP status and ask probing questions. Remember that using a FedRAMP-authorized cloud does not absolve security responsibilities. Read the full Gartner Research Report to learn more.

  • Computer Weekly – 29 November 2016: Machine learning keeps customers happy at Ocado

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how data scientists at online grocer Ocado are using machine learning technology to deliver better customer service. Manufacturing giant GE is making a play to become a top 10 software supplier. And we examine the future of server operating systems as workloads move to the cloud. Read the issue now.

  • A Finance Leader's Guide to Automating Analytics

    Sponsored by: Alteryx

    In this e-book, O’Reilly, a trusted content creator, explores the evolving role of CFOs and how they can do more with less. Read on now to learn how analytics automation can transform finance from manual, error-prone processes to fully automated systems with full visibility.

  • Enterprise Buyer’s Guide for Secrets Detection

    Sponsored by: GitGuardian

    This buyer's guide outlines 10 key considerations for choosing a secrets detection platform to secure your software supply chain. Learn how to gain complete visibility, implement effective detection, streamline remediation, and empower developers. Read the full guide to strengthen your secrets security posture.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.