ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=20start=20start=20"

  • Focus: Agile DevOps

    Sponsored by: TechTarget ComputerWeekly.com

    Businesses in every industry are finding themselves under pressure to out-innovate their competitors, and push out new products and services to customers at an ever-increasing rate.

  • Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.

  • Human-like AI quest drives general AI development efforts

    Sponsored by: TechTarget ComputerWeekly.com

    While AI technologies can do things humans can't, they're currently limited to specific and straightforward tasks. A big goal for developers is to create human-like AI tools that think the way people do. This guide compiles stories on the push toward human-like AI and the challenges that AI vendors and users must overcome.

  • The State of Hybrid and Multi Cloud 2024

    Sponsored by: Veeam Software

    Rapidly evolving cloud environments have a significant effect on the way organizations protect their data. This research brief presents a condensed analysis of recent data and findings collected by Veeham, representing participation from 1,200 enterprise organizations. Read on to learn more.

  • Edge and Industrial IoT at Scale

    Sponsored by: SUSE

    In this 57-page Gorilla Guide you’ll learn how to employ best practices in edge computing that include the use of open source platforms, the integration of information technology (IT) and operations technology (OT) and the use of validated designs. Access the guide.

  • Full visibility and real-time threat response: Helping retailers achieve proactive IT Security

    Sponsored by: Tanium

    Hackers are targeting blind spots and vulnerabilities in the complex, multi-tooled IT systems that retailers depend on. And rather than physical goods, threat actors are stealing valuable data. Discover how adopting a converged endpoint management solution with full visibility of assets can help retailers mitigate and prevent data breaches.

  • Computer Weekly – 24 April 2018: London plans to be a smarter city

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we meet the first ever chief digital officer for London and find out his plans to make the capital a smarter city. SAP has overhauled its controversial indirect licensing policy – we look at the implications. And what are the jobs of the future in retail as the sector is transformed by technology? Read the issue now.

  • MicroScope – May: Bundles deliver surprise package for SMEs

    Sponsored by: MicroScope

    An issue looking at the growing attraction of bundles for small customers plus a look at network security issues.

  • MicroScope – May 2018: Bundles deliver surprise package for SMEs

    Sponsored by: MicroScope

    An issue looking at the growing attraction of bundles for small customers plus a look at network security issues.

  • Get a Fresh Start with SAP S/4HANA Greenfield Transformation

    Sponsored by: Basis Technologies

    Considering a Greenfield transformation to SAP S/4HANA? This guide covers the core motivations, challenges, and best practices to ensure your critical project runs smoothly. Read the full e-book to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.