ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "big data computer weeklystart=20start=20start=30start=20"

  • Key Considerations for Securing Different Non-human Identities

    Sponsored by: CyberArk

    Today's enterprises are powered by a wide variety of non-human identities. And these non-human identities use secrets to access the critical systems they need to do to their jobs. In this eBook, CyberArk walks through the seven types of non-human identities that need to be secured and how a centralized approach to secrets management can help.

  • 5 Security Measures You Need To Take To Keep Your Business Safe From Ransomware

    Sponsored by: Checkpoint Software Technologies

    Today’s threat landscape is unlike anything seen before. This white paper looks at the current threat landscape, analyzing what the unprecedented scope of threats means for modern security, and providing 5 key security measures that you can implement to better prepare against ransomware and other attacks. Read on to discover more.

  • MicroScope – September 2020: Reach out to resellers

    Sponsored by: MicroScope

    In this issue, discover how the channel is making sure the human touch is maintained during the pandemic, with insight into how closer bonds can be developed and on how to maintain productivity. Also read about 'hybrid working' is set to shape the future of the workplace

  • Digital experience focus broadens to encompass employees

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide to employee experience includes a podcast discussion about the evolution of employee experience management. Also, we explore how advanced companies are responding to skills shortages and millennial employee attitudes by listening harder to their workforces.

  • The State of AI at Work

    Sponsored by: Asana

    The rapid rise of AI is transforming the workplace. This in-depth report examines the opportunities and challenges of AI adoption, from productivity gains to literacy gaps. Discover the 5 stages of AI maturity and how to harness AI's potential. Read the full report to learn how to move your organization to AI excellence.

  • Computer Weekly - 8 June 2021: The jobseekers turning to cyber crime in the pandemic

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, security researchers say that people left unemployed by the pandemic are turning to cyber crime – we find out why. We examine the confluence of distributed cloud and edge computing technologies. And controversial uses of facial recognition technology come under further scrutiny. Read the issue now.

  • Data integration to support modern BI and advanced analytics programmes

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we discuss why data integration and preparation are the unsung heroes of modern BI and advanced analytics. More so than ever, it would seem, due to the ever-increasing volume and variety of data.

  • Computer Weekly – 9 July 2024: How data drives decisions at BAE Systems

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the chief data officer of one of the UK's biggest manufacturers, BAE Systems, about data strategy and diversity. Microsoft's claims over sovereign cloud for government IT are under scrutiny – we examine the issues. And our latest buyer's guide looks at trends in cloud databases. Read the issue now.

  • ComputerWeekly's 50 Most Influential Women in IT 2018

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we showcase some of the industry role models who break the stereotypical IT mold, and share opinions on what we can do to make the industry more diverse and inclusive.

  • Driving Cloud Automation with Observability, AIOps, and NetDevOps

    Sponsored by: Aviatrix Systems

    This report explores how observability, AIOps, and NetDevOps are converging to drive cloud automation. It covers key trends, use cases, and leading vendors in these areas. Download the full White Paper to learn how these technologies can improve cloud infrastructure visibility, management, and efficiency.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.