ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=10"

  • Computer Weekly - 11 August 2020: Freezing digital history in the Arctic Circle

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out why GitHub is storing its historical open source code repositories on analogue film in the Arctic Circle. Our buyer's guide examines modern software development practices. And we hear how VR technology helped the UK build more ventilators to deal with the Covid-19 pandemic. Read the issue now.

  • CW Europe – December 2018

    Sponsored by: TechTarget ComputerWeekly.com

    Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.

  • CW Middle East - Oct-Dec 2019: Saudi banks trial biometrics in ATMs

    Sponsored by: TechTarget ComputerWeekly.com

    Biometric and blockchain technologies are being used in tandem to provide ID verification at Saudi Arabian cash machines.

  • Getting Started with Zero Trust Access Management

    Sponsored by: Okta

    For businesses adopting a Zero Trust security posture, placing identity at the posture’s foundation can assure continuous access assessment without friction for users. Explore this e-book to learn the 4 stages that comprise Okta’s model for enabling identity-centric Zero Trust.

  • Evaluating the Pillars of Responsible AI

    Sponsored by: Hitachi Pentaho

    As AI's role expands, responsible AI practices become increasingly crucial. This Enterprise Strategy Group research report covers key pillars like bias, fairness, and transparency, and how to align innovation with ethical AI development. Read on now to learn how you can build an effective, responsible AI strategy for your organization.

  • Trust no one: Why zero trust security is taking the world by storm

    Sponsored by: TechTarget ComputerWeekly.com

    As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.

  • Tech career guide: Cyber security

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at what it takes to make it in Asia-Pacific's cyber security industry.

  • CW Middle East - April-June 2022: UAE and UK researchers work on 'trustworthy' cloud OS for datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    Imperial College London is embarking on a three-year project with an Abu Dhabi-based group of researchers to find ways for datacentre operators and cloud providers to secure their infrastructure. Also read how Dubai is positioning itself to reap the benefits of a promising global market for drone technology.

  • CW APAC, Sep 2021: Buyer's guide to robotic process automation

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at the adoption of robotic process automation in APAC and where the technology fits in the wider automation landscape

  • Global Risks Report 2017

    Sponsored by: TechTarget ComputerWeekly.com

    Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.