ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Freeform Dynamicsstart=20start=20start=10start=20start=20start=10"

  • State of GDPR in mainland Europe

    Sponsored by: TechTarget ComputerWeekly.com

    The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.

  • The Spreadsheet User’s Guide to Modern Analytics

    Sponsored by: Alteryx

    If you're working in spreadsheets to do analysis, 90% of your workday is taken up by menial tasks you'd rather not be doing. Formatting data sources. Cleaning and parsing. Applying formulas.

  • Computer Weekly – 18 August 2020: How Covid-19 elevated the datacentre

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how datacentres and their workers became part of our critical national infrastructure due to the pandemic. Firms considering upgrading to SAP S/4 Hana face hefty bills – we look at how to keep costs down. And we analyse the increasing rate of applications being migrated to the cloud. Read the issue now.

  • Computer Weekly – 18 August 2020: How Covid-19 elevated the datacentre

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how datacentres and their workers became part of our critical national infrastructure due to the pandemic. Firms considering upgrading to SAP S/4 Hana face hefty bills – we look at how to keep costs down. And we analyse the increasing rate of applications being migrated to the cloud. Read the issue now.

  • Rev Up Your Webinar Lead Engine

    Sponsored by: BrightTALK by TechTarget

    With 69% of customers reporting that they typically watch webinars and/or videos when evaluating products during their buying journeys, knowing how to leverage this content is crucial. But, how exactly can you get the most out of your webinars? Access this guide to learn more.

  • Computer Weekly – 1 August 2017: The fields of Athenry – how Apple's datacentre plans are causing turmoil in a small Irish town

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look into Apple's controversial plans to build a huge datacentre in a small town in the west of Ireland, and the local arguments it has caused. We find out how the Met Office is managing its vast quantities of weather data. And we examine Google plans to bring AI to the recruitment market. Read the issue now.

  • 7 characteristics of next-generation networking

    Sponsored by: TechTarget ComputerWeekly.com

    The term next-generation networking refers to the process of designing network infrastructure with new, advanced technologies. Next-generation networks are flexible, nimble and secure architectures that are easier to manage. In this article, analysts offer their perspectives on which technologies help modernize network infrastructures.

  • Proving ownership of IPv6 addresses

    Sponsored by: TechTarget ComputerWeekly.com

    In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.

  • Top IT Predictions in APAC in 2023

    Sponsored by: TechTarget ComputerWeekly.com

    In this round-up, we review some of the key IT trends that are likely to shape the industry across the APAC region in 2023.

  • Artificial Intelligence (AI) And The Future Of Application Security Testing

    Sponsored by: Veracode

    With advances in AI capabilities, hackers have leveraged the evolving technology in order to perform more sophisticated attacks at scale. If actual attacks are using AI, then simulated attack testing that is performed at scale using AI is as close of a simulation to the real thing as one could hope for. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.