ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Freeform Dynamicsstart=20start=20start=10start=20start=20"

  • CW Nordics August 2018

    Sponsored by: TechTarget ComputerWeekly.com

    In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.

  • CW ASEAN: Connect your people

    Sponsored by: TechTarget ComputerWeekly.com

    Unified collaboration (UC) is transforming the way business is done globally. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises are embracing UC tools, factors that organizations should consider when developing a UC strategy, and the emergence of startups that have been shaking up the marketplace.

  • CHAPTER 15: Working with the Command-Line Interface

    Sponsored by: McGraw Hill

    Download this free chapter from ITF+ CompTIA IT Fundamentals to learn how to work with and decipher the command line interface, demonstrate fundamental commands and more.

  • Computer Weekly Buyer's Guide to EU General Data Protection Regulation

    Sponsored by: TechTarget ComputerWeekly.com

    In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.

  • A Computer Weekly Buyer's Guide to Hyperautomation and Bots

    Sponsored by: TechTarget ComputerWeekly.com

    The advantages of bots are only multiplying for businesses across the globe. In this 15-page buyer's guide, Computer Weekly looks at how robotic process automation is evolving, the benefits it brings for coders and the ways artificial intelligence can enhance customer service.

  • Computer Weekly – 7 June 2022: Using technology to reinvent shopping

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after the pandemic led to a boom in e-commerce, we look at how retailers are turning to tech to revitalise their stores. We examine the issues around using algorithmic automation to manage employees. And we find out how data science is supporting drug discovery at Novartis. Read the issue now.

  • Key Considerations for Securing Different Non-human Identities

    Sponsored by: CyberArk

    Today's enterprises are powered by a wide variety of non-human identities. And these non-human identities use secrets to access the critical systems they need to do to their jobs. In this eBook, CyberArk walks through the seven types of non-human identities that need to be secured and how a centralized approach to secrets management can help.

  • Focus: Artificial Intelligence and Machine Learning

    Sponsored by: TechTarget ComputerWeekly.com

    Artificial Intelligence and the sub-set of it which is machine learning are hot. It's been impossible to attend an IT conference in the last year or so without encountering a dead human genius reincarnated as a software system or a robot.

  • Smart Manufacturing eBook

    Sponsored by: Schneider Electric

    How can you boost your smart manufacturing capabilities and enable Industry 4.0 in the future? Read on to learn what the newest wave of smart manufacturing means for your IT department and how you can set your team and organization up for success.

  • Microsoft Azure Red Hat OpenShift Provides More Value And Support To Cloud-First Organizations

    Sponsored by: Red Hat

    Azure Red Hat OpenShift provides a comprehensive container application platform that reduces infrastructure management effort by 50% and development time by 65%. Download this full Forrester Total Economic Impact report to learn how this managed service can increase your organization's cloud agility and innovation.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.