ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30"

  • CW APAC, March 2021: Tech career guide

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at the qualities and skills that are required to be successful in DevOps.

  • TDWI Playbook: Strategies and Practices for Responsible AI. Sponsored by Domino, AWS, NVIDIA

    Sponsored by: Domino

    As the AI landscape rapidly evolves, how can you ensure that your organization’s approach to AI is responsible? In this 18-page e-book “Strategies and Practices for Responsible AI,” unlock insights from Vice President and Senior Director of TDWI Research for advanced analytics, Fern Halper, Ph.D.

  • Top 10 Benelux IT stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    The Netherlands and Belgium might be small in terms of population and land area, but they are leading nations when it comes to the use of technology in society. There are numerous examples of the transformative nature of IT in the Netherlands and Belgium in this top 10, such as plans for autonomous ships and smart city developments.

  • Computer Weekly - 11 January 2022: How Pepsi is taking digital to the max

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to PepsiCo's digital director about delivering innovation in customer experience. Our first buyer's guide of 2022 examines hybrid cloud storage. And we find out how Arkwright and Granville from the BBC sitcom Open All Hours are inspiring retailers 40 years on. Read the issue now.

  • Trend Watch: Generative AI in APAC

    Sponsored by: TechTarget ComputerWeekly.com

    Organisations are starting to incorporate generative AI into their everyday processes. In this handbook, focused on GenAI in the Asia-Pacific region, Computer Weekly looks at how it's being deployed in healthcare, Australia's GenAI journey, the technology's relationship with the cloud and Red Hat's issues with source code.

  • Critical Gaps in Securing Identities

    Sponsored by: CyberArk

    There are significant challenges in securing applications that sit outside of the protections offered by SSO and MFA. Learn in this report, which surveyed senior cybersecurity professionals, how they are approaching these access security challenges and their best practices.

  • Computer Weekly - 14 December 2021: The rules for a safer internet

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.

  • Computer Weekly - 12 July 2022: The most influential people in UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal the 50 most influential people in UK IT for 2022, and talk to the winner of the 12th annual UKtech50, National Cyber Security Centre CEO Lindy Cameron. Also, we take an in-depth look at the crisis in chip supply and what's needed to solve it. Read the issue now.

  • Cyber security in the Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.

  • Top 10 Middle East stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    With money to invest and well-educated populations, the region is using advanced technology to enhance business as well as the quality of life. Read this top 10 for more examples of digital transformation in the Middle East.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.