ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "big data computer weeklystart=20start=20start=30start=20"

  • CW APAC - December 2020: Trend Watch on cloud infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    The rise of 5G is driving telcos to embrace cloud-native and software-defined architectures. In this handbook focused on cloud infrastructure in the Asia-Pacific region, Computer Weekly looks at the slow and steady path businesses are taking to cloud-based radio access networks.

  • Pushing the Boundaries of Innovation: Speed, Scale, and Transformation in the Cloud

    Sponsored by: AWS

    From creating a cloud-based digital production platform to combining disparate multimodal data sets, organizations everywhere continue to double-down on cloud investments to streamline infrastructure management and drive business innovation. Browse this e-book to examine cloud innovation tactics for your company.

  • Pushing the Boundaries of Innovation: Speed, Scale, and Transformation in the Cloud

    Sponsored by: AWS

    From creating a cloud-based digital production platform to combining disparate multimodal data sets, organizations everywhere continue to double-down on cloud investments to streamline infrastructure management and drive business innovation. Browse this e-book to examine cloud innovation tactics for your company.

  • Top 10 cloud stories 2018

    Sponsored by: TechTarget ComputerWeekly.com

    While cloud has established itself as the preferred way for many enterprises to consume IT resources, organisations in some vertical markets have taken markedly longer to come round to its charms. With this as a backdrop, Computer Weekly takes a look at the top 10 cloud stories of 2018.

  • Password Auditing Guide

    Sponsored by: Specops Software

    Audit your Active Directory to uncover password-related security risks. Discover compromised passwords, expired accounts, and more. Download this free password auditing guide to secure your organization.

  • Computer Weekly – 30 August 2016: Get protected

    Sponsored by: TechTarget ComputerWeekly.com

    It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.

  • Red Hat Ansible Automation Platform A beginners guide

    Sponsored by: Red Hat

    80% of organizations say that adopting IT automation is “extremely important” to the future success of their organization, according to Harvard Business Review. This white paper serves as a guide for the Red Hat Ansible Automation Platform. Dive into the guide today.

  • Top 10 Nordic IT stories of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    The Nordic region offers the world a melting pot of tech, with its huge traditional industries and world-leading tech startup hubs.  In this eguide, read about the unique mix of features in the Nordic countries that means traditional businesses and consumers are willing to apply new technology to problems big and small.

  • A Computer Weekly buyer's guide to digital customer experience

    Sponsored by: TechTarget ComputerWeekly.com

    The pandemic has brought on changes to how organisations and their customers interact. In this 15-page buyer's guide, Computer Weekly looks at why firms need to adapt, what customer and employee experience has in common and what companies are doing to update the digital customer experience.

  • Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.