ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=10start=10start=20"

  • Datacentre Management: The latest thinking on good datacentre management practice

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we've pulled together some of the latest thinking on good datacentre management practice, while shining a light on the tools and technologies that are on the market (or in the pipeline) that can help enterprises run their facilities with greater ease and agility.

  • 2024 Outlook for AI Regulations

    Sponsored by: ModelOp

    As AI regulations rapidly evolve, enterprises must act now to govern their AI initiatives. This e-book outlines the key challenges and steps to get started, including deploying an AI governance inventory, implementing basic controls, and reporting on compliance. Read the full e-book to prepare your enterprise for the future of AI.

  • ITIL and ITSM: How IT is becoming more service-oriented

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we shine the light on the state of IT service management (ITSM) and the framework upon which it is effectively built, the IT Infrastructure Library (ITIL). We explore how ITSM is being changed by machine learning, how it can be used in the cloud and the datacentre, and the role ITIL could play in digital business transformation.

  • 15 Machine Learning Use Cases to Solve Everyday Business Problems

    Sponsored by: Alteryx

    When most people think about machine learning, they assume it’s a complex form of AI beyond their reach, requiring hours of coding and complex algorithms to create functional models. But with modern analytics solutions like Alteryx, anyone can create and automate ML models in minutes. Read on to discover 15 use cases for immediate business impact.

  • The Real Value Of Technology Connectivity

    Sponsored by: TeamViewer

    This report explores how technology connectivity drives business benefits like improved efficiency, collaboration, and innovation. It finds that seamless connectivity remains elusive for most organizations, with 95% having gaps to close. Read the full report to learn how to maximize the value of technology connectivity.

  • Computer Weekly – 7 February 2017: Computer power pushes the boundaries

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the ways chip engineers are looking beyond silicon to keep pushing the limits of Moore's Law. We find out about serverless computing and how it could deliver what many firms want from the cloud. And we look at the importance of culture change to digital transformation. Read the issue now.

  • Computer Weekly – 13 August 2019: How tech experts could earn millions as whistleblowers

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a tech expert is set to earn millions after successfully blowing the whistle on vulnerabilities in Cisco's video surveillance software. Our latest buyer's guide examines the issues around big data architecture. And we look at how the end of Windows 7 could spark a new era for desktop productivity. Read the issue now.

  • CW ANZ: Taming the data beast

    Sponsored by: TechTarget ComputerWeekly.com

    Software-defined storage (SDS), which promises greater transparency and control over data, is an increasingly important tool in the enterprise technology armoury. In this issue of CW ANZ, we look at how Australian enterprises are turning to SDS to improve data management and direct data to different tiers of storage or to applications.

  • Accelerate Transformation

    Sponsored by: AWS

    From startups to enterprises, organizations are innovating faster by reducing their infrastructure costs with AWS. Read this e-book to learn how AWS can help you optimize your infrastructure investment.

  • The State of Zero Trust Security 2023

    Sponsored by: Okta

    In partnership with Qualtrics, Okta conducted a global study with the help of 860 information security decisionmakers across a range of industry verticals. In the 38 pages of this report, Okta has condensed the findings of this research so that you can extract the most valuable and relevant information. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.