ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Freeform Dynamicsstart=20start=20start=10start=20start=20start=10"

  • Computer Weekly – 14 May 2019: The startups transforming data analytics

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we travel to Silicon Valley to meet the emerging tech startups hoping to take data analytics to a new level. The NHS desperately needs to recruit IT professionals – we look at the job opportunities. And we examine the best ways to keep cloud costs under control. Read the issue now.

  • Password Auditing Guide

    Sponsored by: Specops Software

    Audit your Active Directory to uncover password-related security risks. Discover compromised passwords, expired accounts, and more. Download this free password auditing guide to secure your organization.

  • Inside Nordic startup hubs

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, discover how the Nordic tech startup scene could rival the US's Silicon Valley. We also take a close look at some of the hubs on offer, with features on Google's investment in Finland, Sweden's hubs in Stockholm and Malmo, as well as Denmark's capital Copenhagen. And don't forget Norway, who's on a mission to rival its neighbours.

  • The Data-Fitness Suite Spot

    Sponsored by: Hitachi Pentaho

    As data challenges grow, point solutions may not be enough. In this white paper, you'll learn how a modular data management platform can provide the scalable, integrated fitness your organization needs to stay agile. Read on now to discover the key capabilities of a data-fit solution.

  • Securing DevOps A Digital-first Imperative for Success

    Sponsored by: CyberArk

    This IDC InfoBrief commissioned by RedHat and CyberArk looks at the importance of securing identities as businesses embrace a DevOps culture in APAC. A full DevSecOps approach has many facets, and the starting point for a successful DevSecOps approach is around identity and access management controls.

  • From fraud detection to protection

    Sponsored by: Teleperformance

    Any company that stores sensitive information is at risk for fraud. Whether it’s financial or personal data, if you have it, there is a good chance someone is trying to get at it. This problem is compounded even more with remote work and the rise of AI. All of this means it’s time to rethink your fraud prevention posture. Read on to learn more.

  • Survey Report: AI, Today

    Sponsored by: Dataiku

    As GenAI becomes a cornerstone of modern business, 90% of leaders are making substantial investments to harness its potential. Of those, 33% have created new budget lines specifically for GenAI, while 57% are using money from other budgets, such as IT, data science, or analytics. Access this research content now to learn more.

  • Computer Weekly – 20 February 2024: Flying into cloud – EasyJet's journey out of the datacentre to AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how EasyJet fills an aircraft every 10 seconds while migrating to the cloud and introducing AI. There's only 283 years to go until we have a diverse IT workforce – we find out why. And we examine how the UK anti-trust investigation into the cloud market could hit the big hyperscalers. Read the issue now.

  • CW APAC, October 2021: Tech Career Guide

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks what is being done to close cyber security’s gender gap in the Asia-Pacific region

  • How University Of Michigan Health-West Improved Clinician Wellbeing

    Sponsored by: Microsoft and Nuance

    Facing burnout, University of Michigan Health-West clinicians used Nuance's Dragon Ambient eXperience to convert conversations into notes, boosting satisfaction and productivity. High users saw 12 extra patients and 20 more wRVUs monthly, with revenue yielding an 80% ROI. Discover how voice tech enhanced clinician experience.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.