ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart=20start=30start=10start=20start=30"

  • The Internet of Things in 2018 - towards enterprise ubiquity

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will explore some of the latest trends around IoT deployments, looking at real world projects, options for CIOs interested in getting involved, and new applications.

  • Generative AI in the Enterprise with AMD Accelerators

    Sponsored by: Dell Technologies & AMD

    How can you ensure your organization is leveraging GenAI to the best of its abilities. This design guide describes the architecture and design of the Dell Validated Design for Generative AI with AMD accelerators. Read now to learn more. Dell PowerEdge server with AMD Instinctâ„¢ Accelerators.

  • Serverless computing: What enterprises need to know

    Sponsored by: TechTarget ComputerWeekly.com

    As the use of public cloud services has gathered steam within enterprises, so too has interest among IT leaders about embracing the principles of serverless computing. In this e-guide we take a closer look at the benefits and pitfalls of serverless, while shining a light on the ways that enterprises across the globe are putting it to use.

  • GenAI: Empowering enterprises and engineering for the future

    Sponsored by: Virtusa

    Discover how generative AI (genAI) is transforming enterprises and engineering. Learn about leveraging GenAI to build new revenue streams, boost productivity, and enhance data engineering. Explore the enterprise readiness of AI tools and Virtusa's perspective on empowering the future. Read the white paper to learn more.

  • CW APAC, May 2022: Trend Watch: Datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on datacentres in the Asia-Pacific region, Computer Weekly looks at the shift towards colocation facilities.

  • How to achieve container security best practice

    Sponsored by: TechTarget ComputerWeekly.com

    In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.

  • How to achieve container security best practice

    Sponsored by: TechTarget ComputerWeekly.com

    In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.

  • CW APAC: CIO trends

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at the top IT predictions for the year ahead

  • CIO Trends #11: Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    Read in this e-guide how Saudi Arabia is harnessing the cloud during the global healthcare crisis. Also read in this issue how SMEs in the United Arab Emirates are adopting the latest technologies at pace to help their businesses survive the Covid-19 related business disruption.

  • CIO Trends #11: Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    Read in this e-guide how Saudi Arabia is harnessing the cloud during the global healthcare crisis. Also read in this issue how SMEs in the United Arab Emirates are adopting the latest technologies at pace to help their businesses survive the Covid-19 related business disruption.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.