ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30start=30"

  • A Computer Weekly buyer's guide to API management

    Sponsored by: TechTarget ComputerWeekly.com

    Application programming interfaces define the correct way for a developer to request services from an operating system. In this 14-page buyer's guide, Computer Weekly looks at how they provide connectivity, the key role of digital bonding, and the importance of keeping APIs up to date and secure.

  • CW Nordics August 2019: Copenhagen woos tech startups

    Sponsored by: TechTarget ComputerWeekly.com

    Copenhagen offers all the advantages startups need to get off the ground and many are setting up with the intention of staying there for the long haul. Also read how Nordic shipping giant Maersk is changing its approach to IT as nimble competitors strip complexity from the business of logistics.

  • Intelligent Workload Portability for a Modern, Agile Hybrid Cloud

    Sponsored by: Nutanix

    This analyst report explores how intelligent workload portability in a hybrid cloud environment can simplify application deployment and management. It also outlines key factors to consider for workload placement and migration, as well as the benefits of a consistent hybrid multicloud platform. Read on now to learn more.

  • Computer Weekly - 20 April 2021: Shop and go – will Amazon's cashless 'just walk out' store work?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, Amazon has opened its first 'just walk out' grocery store in the UK, but is it the right time to hit the high street? We examine the human and technical issues around email security. And we analyse Microsoft's $19bn purchase of voice recognition supplier Nuance. Read the issue now.

  • Identity Governance & Administration Solution Buyer’s Guide

    Sponsored by: Saviynt

    Over the last few years, cloud acceleration, security threats, and constant technology transformation have bombarded enterprises. IGA is fundamental to modern enterprise security. Importantly, IGA builds a foundation for Zero Trust across cloud, hybrid, and on-prem environments. Read on to learn more.

  • MicroScope – May 2021: Exploring digital metamorphosis

    Sponsored by: MicroScope

    Digital transformation is the buzz phrase, but is it more a question of evolution? In this issue, experts weigh in on digitisation and its effect on the world of work. Also read about local broadband providers aiming to improve internet connection and productivity, and find out how to tackle sales in a post-pandemic landscape

  • Computer Weekly – 16 October 2018: Drilling into AI at Shell

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how oil giant Shell is using AI and machine learning to boost workforce productivity. We analyse the attempted Russian cyber attack revealed by the Dutch government. And we look at how blockchain is being used in the food and drink industry to improve supply chain management. Read the issue now.

  • Tactics for digital health organizations to build a stronger behavioral health system

    Sponsored by: The Advisory Board

    Digital health organizations play a crucial role in improving the U.S. behavioral health system. This playbook outlines tactics to address provider shortages, social determinants of health, build the evidence base, and make care more affordable. Read the full playbook to learn how your organization can drive long-term, equitable change.

  • Reduce Risk by Diversifying Your VMware Environment

    Sponsored by: Nutanix

    As organizations diversify from VMware, Nutanix offers a flexible platform to simplify management, lower TCO, and enable hybrid multicloud operations. Read this e-book now to discover how Nutanix can help you address future business needs.

  • Computer Weekly - 8 June 2021: The jobseekers turning to cyber crime in the pandemic

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, security researchers say that people left unemployed by the pandemic are turning to cyber crime – we find out why. We examine the confluence of distributed cloud and edge computing technologies. And controversial uses of facial recognition technology come under further scrutiny. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.