ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=10start=10start=10start=10start=30start=30"

  • CW APAC, November 2022: Trend Watch: Artificial intelligence in APAC

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on the adoption of artificial intelligence (AI) in Asia-Pacific, Computer Weekly looks at what stands in the way of AI adoption, Dell's deep learning model and how AI can realise its potential in healthcare.

  • Computer Weekly Buyer's Guide to services for digitisation and IoT

    Sponsored by: TechTarget ComputerWeekly.com

    In this 13-page buyer's guide, Computer Weekly looksat the use of mid-sized nearshore IT service providers, choosing a cloud-based platform, and how to manage the huge volume of IoT data.

  • Jargon Buster Guide to Voice over IP (VoIP)

    Sponsored by: TechTarget ComputerWeekly.com

    In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.

  • CW APAC – Trend Watch: AI infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    Firms are starting to trust artificial intelligence in some of their most important processes. In this handbook, focused on AI infrastructure trends in the Asia-Pacific region, Computer Weekly looks at how it should be deployed, data and sustainability challenges and the advantages of large language models.

  • Three Proven Tips for Delivering Full-Stack Scalable Apps at Speed

    Sponsored by: AWS

    Full-stack development makes it simple with complete ownership and end-to-end visibility—so your teams can accelerate time to market, increase agility, and realize greater cost efficiency. Speed up the development of mobile and web applications with:Modern tools and frameworksModern APIsModern compute

  • Alteryx Special Edition Finance Analytics

    Sponsored by: Alteryx

    The Office of Finance has insight into every business unit throughout the organization so it’s no surprise CFOs are assuming more strategic roles. This e-book will discuss how forward-thinking leaders are leveraging emerging technologies and data analytics to transform their teams in this changing world of finance. Read on now to learn more.

  • Computer Weekly – 20 June 2017: Why did British Airways' datacentre crash?

    Sponsored by: TechTarget ComputerWeekly.com

    After the recent hastily held general election, the former Cabinet Office minster Ben Gummer lost his Ipswich seat to one of Theresa May's close allies, leaving many wondering if a digital future is still a top priority in the new government. Find the answer to this question, as well as information on the cause of the British Airways IT failure.

  • Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.

  • Dutch organisations demand more from government

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.

  • APAC career guide: Becoming a cyber security pro

    Sponsored by: TechTarget ComputerWeekly.com

    Once the sole domain of highly technical geeks poring over security logs to look for signs of hackers lurking in their networks, cyber security has become more multi-dimensional and varied across specialisations, organisations and industries. In this e-guide, learn what it takes to become a successful cyber security pro in APAC.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.