ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=20start=20start=20"

  • A Computer Weekly buyer's guide to next-generation retail technology

    Sponsored by: TechTarget ComputerWeekly.com

    Customers' shopping habits were changing long before the coronavirus pandemic accelerated the e-commerce boom. In this 18-page buyer's guide, Computer Weekly looks at the tech innovations retailers are using to adapt and better serve customers.

  • A Compact Guide to Large Language Models

    Sponsored by: DataBricks

    Large language models (LLMs) are becoming increasingly important in a variety of applications such as natural language processing, machine translation, code and text generation, and more. Read on to understand the recent rise of LLMs and discover strategies you can leverage to become more data-driven with an LLM.

  • SHEDDING LIGHT ON OEM STORAGE SUPPORT

    Sponsored by: Service Express

    If you are being strong-armed into replacing your current storage with the newest equipment, remember that the “one-option-only” perception is just an illusion. Access this white paper to learn 6 must-know facts before your next storage buy.

  • It's hyper converged-with-everything in today's datacentre

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at the key hyper-converged vendors and their products, as well as hyper-converged tailored to disaster recovery, backup, cloud functionality, and the software-defined hyper-converged products available.

  • How to Manage Unwanted guests in Azure Active Directory

    Sponsored by: One Identity

    Guests in Azure Active Directory-controlled infrastructure need to be treated like the security threats they are. One Identity delivers unified identity security solutions that help customers strengthen their overall cybersecurity posture and protect the people, applications and data essential to business. Read on to learn more.

  • From Patchwork To Platform

    Sponsored by: Red Hat

    This e-book examines the differences between upstream Ansible and Red Hat Ansible Automation Platform, a hardened and supported enterprise solution. Learn how the platform can enhance security, scalability, and ROI for your organization's automation needs. Read the full e-book to discover the benefits of enterprise-grade automation.

  • Computer Weekly – 8 August 2017: Formula 1 goes digital

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how Formula 1 chief Ross Brawn is turning to digitization to enhance the fan experience of Grand Prix racing. We also learn how virtual reality is being used to deliver healthcare services. And our experts examine the ethical concerns around artificial intelligence. Read the issue now.

  • Computer Weekly – 21 August 2018: Delivering the potential of the internet of things

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we hear from early adopters of internet of things technologies about how to deliver on the potential of IoT. We examine strategies for combining hyper-converged infrastructure and cloud storage to best effect. And we find out how the UK government intends to use data to improve Britain's railways. Read the issue now.

  • AI For Cyber Defense

    Sponsored by: CyberMaxx

    For a deep dive on the relationship between AI and cyber defense, check out this 14-page e-book by SVP of Security Operations at CyberMaxx, Gary Monti.

  • Digital Disruption Index: Aligning strategy, workforce and technology

    Sponsored by: TechTarget ComputerWeekly.com

    Business leaders' confidence in the digital capabilities of new entrants to the workplace has improved in the past six months, according to the Digital Disruption Index by Deloitte.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.