ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=10start=10start=20start=20start=20start=10"

  • The Total Economic Impact™ Of Dataiku

    Sponsored by: Dataiku

    Customer interviews and financial analysis found that a composite organization experienced benefits of $23.5 million over three years and an ROI of 413% with Dataiku. Plus, 80% time savings on manual processes, reduced costs, and improved decision making on key business activities. Get a copy of the full study to learn more.

  • CMMC 2.0 for MSPs: Everything You Need To Know

    Sponsored by: Scalepad Software

    The Cybersecurity Maturity Model Certification (CMMC) framework is designed to support and guide MSPs working with the US Department of Defense. This white paper presents a guide to the CMMC, breaking down the essential information so that you can navigate its more complex features. Read on to learn more.

  • The pandemic's  e-commerce boom

    Sponsored by: TechTarget ComputerWeekly.com

    The pandemic appears to have solidified e-commerce's ascendancy against the highstreet. Coronavirus has accelerated technology adoption in many sectors, and people have been forced to stay at home, increasing their online shopping habits in a bid to avoid visiting shops.

  • The Total Economic Impact™ Red Hat Enterprise Linux On Microsoft Azure

    Sponsored by: Red Hat

    Forrester Consulting's Total Economic Impact™ study shows Red Hat Enterprise Linux on Microsoft Azure delivers 192% ROI, $7.85M NPV, and a less than 6-month payback. Key benefits include improved business continuity, reduced data center costs, reallocated IT FTE time, and legacy solution consolidation. Download the full report to learn more.

  • Focus: Securing for the future

    Sponsored by: TechTarget ComputerWeekly.com

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

  • The top 5 generative AI questions on every executive’s mind

    Sponsored by: AWS

    Generative Al is changing daily, making it increasingly critical for every business to learn what it can do and how it fits into their operations. View “The Top 5 Generative AI Questions on Every Executive’s Mind,” an infographic from AWS, to quickly build your understanding & accelerate adoption at your organization.

  • How To Modernize Your Data For A Resilient And Efficient Manufacturing System

    Sponsored by: T-Systems

    In this whitepaper, you’ll discover how advanced data management and data analysis technologies enable manufacturers to leverage their data treasures to increase the resilience of their manufacturing systems and supply chains and make them safe and secure for the future. Read on to learn how you can make the most of your manufacturing data.

  • Computer Weekly – 16 April 2019: Digital transformation at the Crown Prosecution Service

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how the Crown Prosecution Service is helping to digitally transform the UK justice system. We report from Google's cloud conference on the firm's plans to expand its presence in enterprise IT. And we look at the opportunities and challenges of using AI in the education sector. Read the issue now.

  • The Future of Manufacturing with Generative AI

    Sponsored by: Amazon Web Services

    Discover how Amazon Web Services (AWS) can help your industrial organization harness the transformative power of generative artificial intelligence (AI)

  • Multi-pronged approach to cyber security professional development

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.