ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=30"

  • Computer Weekly – 2 May 2023: The ethics of military AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the defence sector looks into using AI to create autonomous weapons, we examine the risks and ethics of military AI. AWS is under fire for not providing vital emissions data to customers – we investigate. And we find out what IT security teams can learn from cyber warfare in Ukraine. Read the issue now.

  • Datacentre Management: The latest thinking on good datacentre management practice

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we've pulled together some of the latest thinking on good datacentre management practice, while shining a light on the tools and technologies that are on the market (or in the pipeline) that can help enterprises run their facilities with greater ease and agility.

  • Computer Weekly – 24 September 2019: Climate change – the challenge for datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the impact of climate change on datacentres as potential victims and contributors to the problem. We look at the rise of voice channels and how IT leaders can use the technology for better customer experience. And we ask what lessons must be learned from Ecuador's citizens' data breach. Read the issue now.

  • CW APAC, March 2021: Tech career guide

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at the qualities and skills that are required to be successful in DevOps.

  • Top 10 Middle East stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    With money to invest and well-educated populations, the region is using advanced technology to enhance business as well as the quality of life. Read this top 10 for more examples of digital transformation in the Middle East.

  • Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.

  • Computer Weekly – 30 August 2016: Get protected

    Sponsored by: TechTarget ComputerWeekly.com

    It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.

  • TDWI Playbook: Strategies and Practices for Responsible AI. Sponsored by Domino, AWS, NVIDIA

    Sponsored by: Domino

    As the AI landscape rapidly evolves, how can you ensure that your organization’s approach to AI is responsible? In this 18-page e-book “Strategies and Practices for Responsible AI,” unlock insights from Vice President and Senior Director of TDWI Research for advanced analytics, Fern Halper, Ph.D.

  • Red Hat Ansible Automaton Platform

    Sponsored by: Red Hat

    In this e-book, discover everything you need to get started with Ansible Automation Platform, including key automation concepts, product features and capabilities, use cases for gaining value quickly, and strategies for implementing organization-wide automation.

  • Computer Weekly - 8 December 2020: Where next for Windows?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, Windows is still the most-used operating system in enterprises – we look at where Microsoft aims to take it next. We examine some of the key questions for CIOs for their 2021 IT strategy. And we analyse the best practice in preventing distributed denial of service (DDoS) attacks. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.