ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=30start=30start=30"

  • Edge and Industrial IoT at Scale

    Sponsored by: SUSE

    In this 57-page Gorilla Guide you’ll learn how to employ best practices in edge computing that include the use of open source platforms, the integration of information technology (IT) and operations technology (OT) and the use of validated designs. Access the guide.

  • The State of ‘Security by Design’

    Sponsored by: Brivo

    Is security an afterthought in building design? In order to answer this question and understand the state of security by design, Brivo commissioned a study involving 800 decision-makers deeply entrenched in the realms of architectural or engineering processes. Read on to learn more.

  • Royal Holloway: Driverless vehicle security for military applications

    Sponsored by: TechTarget ComputerWeekly.com

    Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.

  • Digital Disruption Index – from experimentation to transformation

    Sponsored by: TechTarget ComputerWeekly.com

    Organisations are investing in digital technologies, including artificial intelligence, blockchain and augmented reality, but executives fear they lack skills to implement a digital strategy, Deloitte's Digital Disruption Index reveals.

  • CW Middle East ezine April 2018

    Sponsored by: TechTarget ComputerWeekly.com

    The Middle East region is on a path, or even fast track, to becoming a global digital hub. But any country or region heading in this direction will have some fundamentals to get right.

  • Computer Weekly – 4 October 2016: How Microsoft aims to tackle information overload

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the firm wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer's guide looks at network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.

  • Productivity Driving With Service Operations

    Sponsored by: Service Now x Agineo

    This eBook explores how modern, unified, and automated service operations can empower teams, improve service availability, and drive business impact. Learn how to unlock innovation and deliver extraordinary technology experiences. Read the full eBook today.

  • Microsoft Azure Red Hat OpenShift Provides More Value And Support To Cloud-First Organizations

    Sponsored by: Red Hat

    Azure Red Hat OpenShift provides a comprehensive container application platform that reduces infrastructure management effort by 50% and development time by 65%. Download this full Forrester Total Economic Impact report to learn how this managed service can increase your organization's cloud agility and innovation.

  • Data Enablement: Empowering a Data-Driven Business

    Sponsored by: Alation

    Many companies often see a lack of widespread adoption for new data products by key stakeholders. Read on to learn why a rich, data-driven culture requires an organization to have a singular platform through which data can be exchanged.

  • Cybersecurity for Medical Devices in a Connected Healthcare System

    Sponsored by: Wind River

    As healthcare systems become more connected, cybersecurity for medical devices is critical to mitigate risks. This white paper examines the key considerations for implementing an effective security strategy throughout the device lifecycle. Read the full white paper to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.