ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Top 10 ASEAN IT stories of 2022

    Sponsored by: TechTarget ComputerWeekly.com

    Despite challenges, those in ASEAN have taken things in stride as they press on with digital transformation, whether it is empowering citizen developers or building cloud-native applications. Here are Computer Weekly's top 10 ASEAN IT stories of 2022.

  • How to Democratize Analytics

    Sponsored by: Alteryx

    Data democratization is a challenging, ongoing process that requires a clear strategy and buy-in from crucial people within your business. Download this guide to identify and address democratization challenges, learn what you need to do to successfully democratize, and discover the ROI you could see from your efforts.

  • How AI in the workplace is changing ERP systems

    Sponsored by: TechTarget ComputerWeekly.com

    As AI becomes more embedded in workplace processes and bots, it will learn on the job and eventually become more independent, leading to more autonomous ERP systems.

  • The AI Disruption: Challenges and Guidance for Data Center Design

    Sponsored by: Schneider Electric

    Artificial intelligence (AI) deployments are taking up an increasingly large portion of data center workloads. This paper explains relevant attributes and trends of AI workloads and describes the resulting data center challenges, including Guidance for how to address these challenges. Read on to learn more.

  • The AI Disruption: Challenges And Guidance For Data Center Design

    Sponsored by: Schneider Electric

    This eBook analyzes impact of AI on data center design. Key takeaways: AI workloads driving higher rack densities; transition from air to liquid cooling needed; guidance on power, cooling, racks. Read the full eBook to learn best practices for AI-ready data centers.

  • Creating pathways to stability for immigrating children and families

    Sponsored by: ICF

    Discover how ICF's expertise in child welfare, data science, and workforce optimization can help create pathways to stability for immigrating children and families. Learn best practices for inter-agency collaboration, data management, and training to support this vulnerable population. Read the e-book to learn more.

  • Powerful DDoS Attacks & Recovery for Enterprises

    Sponsored by: Arbor Networks

    A series of potent, record-setting DDoS attacks hit several targets in 2016 using IoT malware to infect and leverage a large number of internet connect devices. Inside this guide, experts reveal 11 key takeaways for this type of attack and real-world examples of companies suffering from the aftermath including Dyn.

  • Computer Weekly - 15 March 2022: How the tech sector is supporting Ukraine

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.

  • A Computer Weekly buyer's guide to communications as a service

    Sponsored by: TechTarget ComputerWeekly.com

    As communications needs evolve, organisations must keep pace with the latest services available. In this 15-page buyer's guide, Computer Weekly looks at how we arrived at current-day comms systems, the growing popularity of CPaaS and the advantages of cloud-based offerings in the new normal of hybrid working.

  • 10 common uses for machine learning applications in business

    Sponsored by: TechTarget ComputerWeekly.com

    Machine learning (ML) enables businesses to perform tasks on a scale previously thought impossible. As a result, many organizations are finding ways to harness ML to not just drive efficiencies but to fuel new business opportunities. Here are 10 applications of ML that are being used to solve problems & deliver tangible business benefits:

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.