Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
Top 10 ASEAN IT stories of 2022
Sponsored by: TechTarget ComputerWeekly.comDespite challenges, those in ASEAN have taken things in stride as they press on with digital transformation, whether it is empowering citizen developers or building cloud-native applications. Here are Computer Weekly's top 10 ASEAN IT stories of 2022.
-
How to Democratize Analytics
Sponsored by: AlteryxData democratization is a challenging, ongoing process that requires a clear strategy and buy-in from crucial people within your business. Download this guide to identify and address democratization challenges, learn what you need to do to successfully democratize, and discover the ROI you could see from your efforts.
-
How AI in the workplace is changing ERP systems
Sponsored by: TechTarget ComputerWeekly.comAs AI becomes more embedded in workplace processes and bots, it will learn on the job and eventually become more independent, leading to more autonomous ERP systems.
-
The AI Disruption: Challenges and Guidance for Data Center Design
Sponsored by: Schneider ElectricArtificial intelligence (AI) deployments are taking up an increasingly large portion of data center workloads. This paper explains relevant attributes and trends of AI workloads and describes the resulting data center challenges, including Guidance for how to address these challenges. Read on to learn more.
-
The AI Disruption: Challenges And Guidance For Data Center Design
Sponsored by: Schneider ElectricThis eBook analyzes impact of AI on data center design. Key takeaways: AI workloads driving higher rack densities; transition from air to liquid cooling needed; guidance on power, cooling, racks. Read the full eBook to learn best practices for AI-ready data centers.
-
Creating pathways to stability for immigrating children and families
Sponsored by: ICFDiscover how ICF's expertise in child welfare, data science, and workforce optimization can help create pathways to stability for immigrating children and families. Learn best practices for inter-agency collaboration, data management, and training to support this vulnerable population. Read the e-book to learn more.
-
Powerful DDoS Attacks & Recovery for Enterprises
Sponsored by: Arbor NetworksA series of potent, record-setting DDoS attacks hit several targets in 2016 using IoT malware to infect and leverage a large number of internet connect devices. Inside this guide, experts reveal 11 key takeaways for this type of attack and real-world examples of companies suffering from the aftermath including Dyn.
-
Computer Weekly - 15 March 2022: How the tech sector is supporting Ukraine
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.
-
A Computer Weekly buyer's guide to communications as a service
Sponsored by: TechTarget ComputerWeekly.comAs communications needs evolve, organisations must keep pace with the latest services available. In this 15-page buyer's guide, Computer Weekly looks at how we arrived at current-day comms systems, the growing popularity of CPaaS and the advantages of cloud-based offerings in the new normal of hybrid working.
-
10 common uses for machine learning applications in business
Sponsored by: TechTarget ComputerWeekly.comMachine learning (ML) enables businesses to perform tasks on a scale previously thought impossible. As a result, many organizations are finding ways to harness ML to not just drive efficiencies but to fuel new business opportunities. Here are 10 applications of ML that are being used to solve problems & deliver tangible business benefits: