ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"

  • CW Benelux August 2019: Dutch academic seeks the personality behind the cyber criminal

    Sponsored by: TechTarget ComputerWeekly.com

    There is at least one person behind every cyber attack, but beyond that insight, very little known is about them. Rutger Leukfeldt, senior researcher on cyber crime at the Netherlands Institute for the Study of Crime and Law Enforcement, has been trying to get inside the minds of hackers.

  • How Healthcare IoT Resilience, Efficiency, and Security Impact Hospitals

    Sponsored by: Schneider Electric

    This white paper explores how resilience, efficiency, and security impact overall hospital operations and how IT professionals in healthcare environments can help their hospitals make major strides forward in their IoT and digital transformation. Read on to learn more.

  • CW Benelux May 2018

    Sponsored by: TechTarget ComputerWeekly.com

    GDPR becomes law at the end of this month, so we take a look at how organisations in the Netherlands are preparing for it. Cover your eyes if you are squeamish as you only have days left to get things right.We lead this issue with a story published in February, so perhaps things have changed. But if not, some organisations should be concerned.

  • Computer Weekly – 26 September 2017: Building on legacy IT

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, experts at VMworld 2017 discussed how to adapt legacy IT to make the most of modern technology – we listened in. Artificial intelligence is touted as an aid to decision-making, but it needs to be handled with care. And we learn how Wales has become a hotspot for cyber security innovation. Read the issue now.

  • VMworld 2019 Europe: Where next for VMware?

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, check out ourround-up of some of the biggest announcements VMware made at this year's VMworld US 2019 conference, as part of a countdown towards its European conference in November 2019.

  • Data and AI Pulse: Asia Pacific 2024

    Sponsored by: SAS

    The Asia Pacific region is rushing to capitalize on AI, with 43% planning large investments. However, the lack of AI maturity raises concerns over overly optimistic ROI expectations. This IDC report explores the challenges organizations face and lessons from AI leaders to scale AI for business impact.

  • Building an AI strategy: Telcos put the foundations in place

    Sponsored by: AWS

    This report – based on interviews with 20 of the world’s largest and leading CSPs globally, plus a survey of 104 executives across 73 telcos worldwide – sets out to evaluate where operators are with their AI strategies and what they need to do to make them fit for the future and deployed at scale.

  • The Business Value of Red Hat Ansible Automation Platform

    Sponsored by: Red Hat

    In this IDC report, you will learn about the business benefits of using Red Hat’s Ansible automation solution. Highlights from the report include:$8.54 million higher revenue per organization per year36% development team productivity gainsRead the full, 30-page report to explore the ROI you could receive from using Ansible.

  • The Future of Financial Services: Part 1

    Sponsored by: TechTarget ComputerWeekly.com

    In the first part of our 'Future of Financial Services' e-guide series, we interview 5 fledgling fintech companies that are working on a wide range of products and services to help reduce costs and make businesses more effective.

  • MicroScope – October 2020: Get in touch with remote network security

    Sponsored by: MicroScope

    In this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.