ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=30"

  • Quantum computing in action

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at Finland and how state investment is being used in a milestone project involving public and private sector organisations to understand the applications of the technology. And we hear how Spanish bank BBVA is examining the complex financial problems that could be solved by quantum computing.

  • The Complete Buyer’s Guide to Data Science Platforms

    Sponsored by: Anaconda

    This buyer's guide covers how to evaluate and select the right data science platform for your organization. It discusses key considerations like collaboration, security, scalability, and deployment. Learn how to choose the best platform to drive business value from your data science efforts. Read the full guide.

  • 2024 global threat report

    Sponsored by: CrowdStrike

    The advent of AI as a tool has lowered the barrier of entry for hackers, only adding fuel to the fire that is the rapidly expanding threat landscape. With this 2024 Global Threat Report, CrowdStrike’s elite Counter Adversary Operations team delivers actionable intelligence you can use to stay ahead of today’s threats. Read on to learn more.

  • AIOps for Monitoring

    Sponsored by: LogicMonitor

    IT departments, under increasing pressure to work faster and deliver results while reducing costs, could use the benefits offered by AI. In this eBook, learn how an AIOps approach that builds on observability and automation enables IT to gain the insights they need to work more proactively and perform more effectively.

  • A Deep Dive into Shadow IT: Examples, Risks, and Solutions

    Sponsored by: Auvik Networks, Inc.

    Shadow IT threatens data security and compliance. In this white paper, discover examples like unapproved comms tools or personal devices, and learn how to tackle shadow IT risks and solutions.

  • Computer Weekly – 28 May 2024: Digital border problems are stacking up

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the government's post-Brexit plans for digital borders as problems begin to emerge. We find out about AI PCs and ask whether they will make any difference for enterprise IT. And we talk to Red Hat CEO Matt Hicks about the open source opportunities from AI. Read the issue now.

  • MicroScope – May: Bundles deliver surprise package for SMEs

    Sponsored by: MicroScope

    An issue looking at the growing attraction of bundles for small customers plus a look at network security issues.

  • MicroScope – May 2018: Bundles deliver surprise package for SMEs

    Sponsored by: MicroScope

    An issue looking at the growing attraction of bundles for small customers plus a look at network security issues.

  • Computer Weekly – 6 August 2019: Using tech to boost staff morale

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the emerging technologies being used to improve employee experience and raise staff loyalty and motivation. The CIO of the Football Association explains how IT is changing the way the national game is administered. And we examine the growing role of AI in preventing cyber attacks. Read the issue now.

  • Open Your Poss Ibilities with Red Hat and Google Cloud

    Sponsored by: Red Hat

    Learn how Red Hat and Google Cloud can help you build a flexible, secure, and efficient hybrid cloud environment to support your business. Download this white paper to discover strategies for modernizing your IT infrastructure, automating your operations, and accelerating application development.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.