ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=10start=20"

  • How open source is spurring digital transformation

    Sponsored by: TechTarget ComputerWeekly.com

    From Linux to Kubernetes, open source has been key to efforts by organisations across APAC to transform digitally. In this e-guide, read how Malaysia's AmBank is using open source to engineer its software from the ground-up, ANZ Bank's move to Red Hat OpenShift, and what suppliers are doing to support deployments of containerised applications.

  • Computer Weekly – 30 July 2024: CrowdStrike blue screen bug serves a stark warning

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we analyse the lessons from the global IT outage caused by the blue screen bug in CrowdStrike security software. We talk to the data chief of Barilla, the €4bn pasta maker, about the benefits of asking, "So what?" And we find out how Finland is taking a lead on quantum computing. Read the issue now.

  • Top 10 IT in the Nordics stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    The Nordic region punches above its weight in IT terms, with a rich tech ecosystem that ranges from clusters of tech startups creating the latest apps to large in-house IT teams transforming traditional industries. Here are Computer Weekly's top 10 Nordic enterprise IT stories of 2019.

  • CW APAC – Tech Career Guide: Artificial intelligence

    Sponsored by: TechTarget ComputerWeekly.com

    Artificial intelligence roles abound in the era of digitisation. In this handbook, focused on AI in the Asia-Pacific region, Computer Weekly looks at AI ethics, how to make it as a machine learning engineer, Accenture's push for tech talent and cyber security research lab advice.

  • CW APAC: August 2023 – Expert advice on storage and backup

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on storage and backup in the Asia-Pacific region, Computer Weekly looks at why 3-2-1 backup is still relevant, how researchers are overcoming restraints found in typical DNA storage systems, Dell's latest offerings and the future of HDDs.

  • The CISO Guide to Ransomware Prevention

    Sponsored by: Checkpoint Software Technologies

    Over the last 5 years, ransomware attacks have increased by 13%, with the average cost exceeding $1.8 million per incident. This white paper presents a CISO’s guide to ransomware prevention, including insights from Check Point VP Security Engineering, Jeff Schwartz. Read on to learn more.

  • CW Europe – June 2017

    Sponsored by: TechTarget ComputerWeekly.com

    This quarter in CW Europe we look at how momentum in the artificial intelligence industry in France might be slowed due to ethical questions.

  • IT Project: Migration to cloud

    Sponsored by: TechTarget ComputerWeekly.com

    The benefits of using cloud are well-known, but the challenges and barriers enterprises come up against during their move off-premise can be wide, varied and unexpected. Knowing how best to negotiate these issues can help speed up the process of shifting workloads and applications to the cloud immeasurably.

  • CW ANZ – September 2018: Get to grips with DevOps

    Sponsored by: TechTarget ComputerWeekly.com

    The burgeoning DevOps culture in Australia has attracted new market players and led major companies to embrace the movement to get development and operations teams working in unison.

  • A Computer Weekly buyer's guide to edge datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    Edge datacentres seem set for a post-pandemic resurgence. In this 17-page buyer's guide, Computer Weekly looks at what makes them such an appealing option, the role infrastructure as code has to play and what's driving company adoption.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.