ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart=20start=30start=10start=20start=30"

  • API Management: The role of APis in digital business transformation

    Sponsored by: TechTarget ComputerWeekly.com

    Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.

  • Computer Weekly – 5 October 2021: The most influential women in UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal the 50 women chosen as the most influential in UK technology for 2021, and talk to the 10th winner of our annual list – Poppy Gustafsson, CEO of Darktrace. Also, our latest buyer's guide looks at digital customer experience technologies. Read the issue now.

  • CW Europe - December 2021-February 2022: Norway embraces internet of things

    Sponsored by: TechTarget ComputerWeekly.com

    Norway is becoming a centre of IoT innovation as tech developers tackle some of the country's unique challenges, in areas such as fish farming, power distribution and monitoring of boats.

  • Top 10 Benelux IT stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    The Netherlands and Belgium might be small in terms of population and land area, but they are leading nations when it comes to the use of technology in society. There are numerous examples of the transformative nature of IT in the Netherlands and Belgium in this top 10, such as plans for autonomous ships and smart city developments.

  • IT Project: DevOps

    Sponsored by: TechTarget ComputerWeekly.com

    2016 is widely tipped to be the year DevOps goes mainstream, with enterprise IT managers either looking to ramp up or kick-start their efforts in this area, and start realising the benefits it can bring.

  • Top 10 ASEAN IT stories of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    From adopting DevOps practices to rolling out award-winning credit processing platforms, ASEAN organisations have what it takes to be on the cutting edge of digital transformation. In this roundup, we recap the top 10 ASEAN IT stories in 2021, including the opportunities and challenges that organisations in the region have faced over the past year.

  • Business Analytics: how AI is augmenting analysis, and bolstering data literacy shortfalls

    Sponsored by: TechTarget ComputerWeekly.com

    Artificial Intelligence and human analysis have been coming together in recent years. Whether using packaged BI and data preparation tools, or languages like Python and R, business analysts and data scientists and engineers alike have been exploring the use of machine learning algorithms to augment their data analyses. Read more in this e-guide.

  • ITIL and ITSM: How IT is becoming more service-oriented

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we shine the light on the state of IT service management (ITSM) and the framework upon which it is effectively built, the IT Infrastructure Library (ITIL). We explore how ITSM is being changed by machine learning, how it can be used in the cloud and the datacentre, and the role ITIL could play in digital business transformation.

  • CW Nordics May 2017

    Sponsored by: TechTarget ComputerWeekly.com

    The cloud is so pervasive within enterprises today that it is easy to understate the way it has changed businesses. The internet of things is putting your security at risk. How did application performance monitoring prevent a business disaster? Read on to explore all this and much more.

  • How Do Vulnerabilities Get Into Software?

    Sponsored by: Veracode, Inc.

    Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.