ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "big data computer weeklystart=20start=20start=30start=20"

  • Computer Weekly - 1 June 2021: The technology that enabled Covid-19 genome sequencing success

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the scientists behind the UK's gene sequencing work during the coronavirus pandemic to find out how cloud and data analytics enabled their success. It's three years since GDPR entered into law – we assess its progress. And we examine low-code software development for a small business. Read the issue now.

  • CW APAC: Trend Watch: Database technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on database technology in the Asia-Pacific region, Computer Weekly looks at the impact of graph databases and the different types of database management systems currently on the market.

  • Computer Weekly – 12 December 2023: Shaping the modern workplace

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how the shift to cloud services and the need to deal with a hybrid workforce have changed modern IT. The emerging area of computational storage promises performance boosts for demanding workloads – we look at the challenges. And we find out how Zoom plans to exploit GenAI. Read the issue now.

  • CW EMEA: Investing in the future

    Sponsored by: TechTarget ComputerWeekly.com

    There is a lot of uncertainty in the world right now, and businesses might be forgiven for taking a cautious approach to their planning. But one thing is certain, and that is that oil-rich countries in the Middle East will continue to invest heavily in diversifying their economies.

  • Business Analytics: how AI is augmenting analysis, and bolstering data literacy shortfalls

    Sponsored by: TechTarget ComputerWeekly.com

    Artificial Intelligence and human analysis have been coming together in recent years. Whether using packaged BI and data preparation tools, or languages like Python and R, business analysts and data scientists and engineers alike have been exploring the use of machine learning algorithms to augment their data analyses. Read more in this e-guide.

  • Fit for a Secure Future

    Sponsored by: Vodafone

    This cybersecurity report details how you can become a Fit for the Future (FFTF) business; organizations that take a very different approach to security challenges, resulting in increased revenue, ESG commitment, and reduced impact from cybersecurity attacks. Explore the report here.

  • CW APAC: Buyer's Guide to human capital management

    Sponsored by: TechTarget ComputerWeekly.com

    In this buyer's guide, focused on human capital management (HCM) in the Asia-Pacific region, we look at the advantages of HCM software in recruitment, the importance of listening to staff and the considerations that should be made when using work algorithms.

  • How to be Resilient Against Cybersecurity Issues in Higher Education.

    Sponsored by: Schneider Electric

    Increasing ransomware attacks, shrinking IT teams: These are two of the many challenges that higher education institutions encounter on the road to stronger cybersecurity. Along with digging into those factors and their implications, this white paper explores how to level up a school’s security posture. Read on to unlock these insights.

  • Outcome-Driven Teams Measuring The Value Your Customers Experience

    Sponsored by: Atlassian

    In order to realize your businesses goals, architecting a strategy is not enough. This e-book looks at how leaders and teams establish a vision and coordinate to deliver that vision, as well as how adaptable and sustainable work and is transforming customer and employee experience. Read on to learn more.

  • Computer Weekly – 18 June 2019: Applying AI to road safety

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we visit a Tokyo project where artificial intelligence is helping to improve road safety by detecting potential subsidence. As bug bounty programmes become popular, we look at what's involved and the pitfalls to beware. And we discuss digital development in healthcare with NHS England. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.