ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "big data computer weeklystart=20start=20start=30start=20"

  • Orion Case Study

    Sponsored by: AllCloud

    Orion, a leading supplier of carbon black, wanted to migrate its highly complex simulations of chemical processes to the cloud. The company partnered with AllCloud to prepare the cloud journey, resulting in 20% faster calculations and improved manufacturing processes. Access the case study to explore how AllCloud can support your cloud journey.

  • CW EMEA – August 2023: Helsinki's Aalto University: Where ideas take off

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of CW EMEA, we look at the startup scene in Finland. Every startup needs a starting place, and many Finnish innovators began at Aalto University. We also look at how the Gulf region is seeing some of the heaviest investments in the latest technology as countries diversify their economies to reduce reliance on oil. Read the issue now.

  • The technological evolution of IT industry leaders: Part two

    Sponsored by: TechTarget ComputerWeekly.com

    Companies leading the technological evolution have gone through changes. This second part of this e-guide explores the technological evolution of SAP, Microsoft and some business analytics vendors throughout the past two decades.

  • IT Priorities 2020: Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    When Computer Weekly's IT priorities survey was carried out Covid-19 was not something IT leaders would consider when planning ahead. The results of the survey must be considered with this in mind. Discover here the results of Computer Weekly's IT priorities survey for 2020 in Middle East.

  • A Computer Weekly buyer's guide to application modernisation

    Sponsored by: TechTarget ComputerWeekly.com

    In this 15-page buyer's guide, Computer Weekly investigates how organisations are approaching the modernisation, replatforming and migration of legacy applications. We look at the tools and technologies available, change management, and the use of APIs and containerisation to make legacy functionality to cloud-native applications.

  • Financial applications automation – promise is real but needs business nous

    Sponsored by: TechTarget ComputerWeekly.com

    The automation of the financial software that lies at the heart of any business – accountancy, budget management, general ledger, payroll, and so on – is a prize many organisations are eyeing up, with machine learning and robotic process automation close to mind. Find out everything you need to know by downloading this PDF E-Guide.

  • Sustainability at the Edge

    Sponsored by: Schneider Electric

    There is a yawning gap between enterprise perceptions and sustainability initiative realities. So how can your organization bridge the gap? Find out in this research report.

  • Computer Weekly – 20 September 2022: A gold medal performance for networking

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the IT team behind the 2022 Commonwealth Games in Birmingham delivered a winning performance, how the centuries-old London insurance market is going digital, thanks to Lloyd's of London, and how low-cost high street stores succumbed to the inevitable and are going online. Read the issue now.

  • CW Nordics - November 2020-January 2021: Bank branch closures continue as digital banking grows

    Sponsored by: TechTarget ComputerWeekly.com

    Sweden's Handelsbanken is cutting its branch network by nearly half, which means more money will be invested in IT. But it's not just Sweden and the Nordics – banks across the world are watching the fintech industry demonstrate to consumers what banking can be like if the right technology is in place.

  • How Do Vulnerabilities Get Into Software?

    Sponsored by: Veracode, Inc.

    Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.