Search Results for "CW Special Reportstart%3D20start=30start=20start=10start=30"
-
The rise of edge computing
Sponsored by: TechTarget ComputerWeekly.comThe growing momentum around 5G has spurred the rise of edge computing applications designed to crunch and process data at the edge of the network. In this e-guide, read more about edge computing developments in the Asia-Pacific region, as well as the pros and cons of adding edge computing to a cloud architecture
-
Royal Holloway: Secure connected and autonomous vehicles - the long road ahead
Sponsored by: TechTarget ComputerWeekly.comAdvances in technology have led to safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
-
Effortless Enterprise Deployments: Navigating Docker for Maximum ROI
Sponsored by: DockerThis white paper explores how containerization with Docker can help enterprises accelerate software delivery, improve developer productivity, and realize significant ROI. Learn how Docker can streamline your development processes and modernize your IT infrastructure. Read the full white paper now.
-
Using IT initiatives to save money and reinforce green credentials
Sponsored by: TechTarget ComputerWeekly.comAnalyst Group Quocirca explains how organisations can use web data caching software to save money and improve their green credentials.
-
UZ Leuven And NetApp Mark A Healthy, 20-Year Relationship Built On Trust
Sponsored by: Arrow NetAppUZ Leuven, a top Belgian healthcare provider, has a 20-year partnership with NetApp, using their data solutions for critical health records and quick response to needs. Discover how their all-NetApp setup ensures efficiency, flexibility, and data safety in this case study.
-
Key Considerations for Securing Different Non-human Identities
Sponsored by: CyberArkToday's enterprises are powered by a wide variety of non-human identities. And these non-human identities use secrets to access the critical systems they need to do to their jobs. In this eBook, CyberArk walks through the seven types of non-human identities that need to be secured and how a centralized approach to secrets management can help.
-
Computer Weekly – 4 September 2018: Power Play – how GE builds digital into its products
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we speak to Bill Ruh, the head of GE Digital about how the business has changed to focus on customer outcomes following a change in senior leadership. The company is exploring new industries to take its Predix platform such the hospitality sector. We also look at the problems of implementing SAP S/4 Hana.
-
Computer Weekly - 20 April 2021: Shop and go – will Amazon's cashless 'just walk out' store work?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, Amazon has opened its first 'just walk out' grocery store in the UK, but is it the right time to hit the high street? We examine the human and technical issues around email security. And we analyse Microsoft's $19bn purchase of voice recognition supplier Nuance. Read the issue now.
-
MicroScope – May 2020: Staying connected
Sponsored by: MicroScopeIn this issue, read about how the channel is helping customers stay connected during the pandemic, with Covid-19 raising hardware as businesses aim to provide technology for home workers. Also discover the benefits of SD-WAN and learn about the top compliance concerns for the coming year
-
The long march of S/4 Hana
Sponsored by: TechTarget ComputerWeekly.comS/4 Hana, the ERP system built on SAP's in-memory, columnar database Hana has been on a long march through the enterprise since its launch in February 2013. In this e-guide, we discuss the pros and cons of upgrading to S/4 Hana, what the future has in store for the system and how its users are feeling about C/4 Hana integration.