Search Results for "Gartner computer weeklystart=10start=30start=30"
-
Decentralising datacentres: The new challenges of security at the edge
Sponsored by: TechTarget ComputerWeekly.comIn September 2020, the Computer Weekly Security Think Tank, our panel of information and cyber security experts, consideredthe challenges inherent in decentralising the datacentre, and set out to answer the question, how can security professionals ensure such setups are just as secure as the traditional centralised model? Read more in this e-guide.
-
A Computer Weekly Buyer's Guide to Enterprise Open Source
Sponsored by: TechTarget ComputerWeekly.comIn this 13-page buyer's guide, Computer Weekly looks at open source technology. Discover more about why open source has become the infrastructure choice over commercial software; the due diligence required to reap the rewards of open source and how to choose the best fit for your needs.
-
Improving Data Quality in the Age of Generative AI
Sponsored by: AlteryxGenerative AI can revolutionize your business. But it relies on one crucial element: high-quality data. This playbook from Alteryx and Databricks, “Improving Data Quality in the Age of Generative AI”, will give you strategies to overcome data quality challenges for your generative AI initiatives. Read on now to learn more.
-
Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.
-
Harnessing AI And Machine Learning To Improve Identity Security
Sponsored by: SailPoint TechnologiesAccess this white paper to discover how AI and machine learning can enhance identity security by detecting anomalies and managing identity outliers. Additionally, you can learn how SailPoint's solutions can strengthen your organization's access governance and cybersecurity posture. Read the full white paper to gain more insight.
-
Future Further Report
Sponsored by: LogicMonitorDownload this infographic for a consolidation of the data and the desires of IT managers into one report, which sheds light on hotspots that, when addressed, will position your organization for long-term resiliency.
-
Royal Holloway: Protecting investors from cyber threats
Sponsored by: TechTarget ComputerWeekly.comThe cyber security of personal investors who use UK investment platforms to manage their pensions or savings is not well understood and not often discussed. In this Royal Holloway security article, we identify the principal cyber threats to investors' assets on UK investment platforms and what can be done to prevent or mitigate these threats.
-
The Threat Prevention Buyer’s Guide
Sponsored by: ZscalerThis Threat Prevention Buyer's Guide explores the evolving security landscape, emphasizing the need for cloud-native sandboxing that can detect and prevent unknown threats inline without disrupting user productivity. Learn how to choose the right cloud sandbox solution. Read the full buyer's guide.
-
CW Nordics: Bergen’s tech hub seeks global success
Sponsored by: TechTarget ComputerWeekly.comNorway's second largest city, Bergen, is building a tech ecosystem that is beginning its development with a focus on the city's industrial heritage. Also in this issue, read how Norway's government has had to backtrack on a law that removed tax relief on energy consumption at datacentres that process cryptocurrency mining.
-
CW Nordics - August-October 2020: Bergen's tech hub seeks global success
Sponsored by: TechTarget ComputerWeekly.comNorway's second largest city, Bergen, is building a tech ecosystem that is beginning its development with a focus on the city's industrial heritage. Also in this issue, read how Norway's government has had to backtrack on a law that removed tax relief on energy consumption at datacentres that process cryptocurrency mining.