ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=30"

  • A Computer Weekly buyer's guide to sustainable datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    There is a growing need for datacentres to adapt to modern demands. In this 19-page buyer's guide, Computer Weekly looks at the new ideas coming from IT leaders looking to revamp datacentres, the importance of water usage in sustainability plans and the role uninterruptible power supplies have to play in decarbonisation

  • A Computer Weekly buyer's guide to sustainable datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    There is a growing need for datacentres to adapt to modern demands. In this 19-page buyer's guide, Computer Weekly looks at the new ideas coming from IT leaders looking to revamp datacentres, the importance of water usage in sustainability plans and the role uninterruptible power supplies have to play in decarbonisation.

  • CW Middle East - January-March 2022: What does Saudi Arabia's autonomous vehicle agenda mean for the world?

    Sponsored by: TechTarget ComputerWeekly.com

    If all goes according to plan, within a few years, one million people will live in Saudi Arabia's 'city of the future' – and every one of them will depend on a fleet of self-driving cars. Also in this issue, read about the UAE's bid to become a world-leading location for artificial intelligence innovation.

  • Computer Weekly - 29 October 2019: IR35 reforms - the difficult decisions facing IT contractors

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.

  • Deploying an Intelligent Cloud: 7 Strategies for Success

    Sponsored by: Nutanix

    In this e-book, you'll discover 7 proven strategies to optimize your hybrid multicloud environment and maximize cloud productivity and cost savings. Dive in now to learn how to automate operations, control data services, and leverage AIOps.

  • White Paper Transform your IT with AWS

    Sponsored by: T-Systems

    Many cloud migrations fail not because of technology, but rather because of established business processes or the corporate culture. The goal of a cloud migration should not be transforming your technology, but rather transforming the business. Read on to learn about best practices you can leverage to successfully tackle your cloud migration.

  • Computer Weekly – 16 October 2018: Drilling into AI at Shell

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how oil giant Shell is using AI and machine learning to boost workforce productivity. We analyse the attempted Russian cyber attack revealed by the Dutch government. And we look at how blockchain is being used in the food and drink industry to improve supply chain management. Read the issue now.

  • CW ASEAN: European data law - be aware and prepare

    Sponsored by: TechTarget ComputerWeekly.com

    Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.

  • Build vs Buy eBook

    Sponsored by: PatientIQ

    Launching an integrated outcomes program requires seamless integration of EHR modules, IT systems, and clinical workflows. This e-book outlines the technical requirements, workflow engine, and population health management capabilities needed to successfully implement an effective outcomes program. Read the full e-book to learn more.

  • Identity security buyer’s guide

    Sponsored by: SailPoint Technologies

    Leaders across industries are recognizing that digital identities and their access across the organization today are essential to securing the business. This guide is designed as a blueprint for your journey to a future-proof and successful identity security program. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.