ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=10start=10start=20start=30start=10start=30"

  • Can AI take education to a new level?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how LLMs are being used to teach, support and assess students, enhancing education rather than impairing it. We look at how AI is impacting the semiconductor sector as big tech companies put off server upgrades. And we find out how GenAI is changing the way enterprise software works. Read the issue now.

  • From Blockchain to IoT, the latest tech trends in logistics

    Sponsored by: TechTarget ComputerWeekly.com

    Delivering physical products to a customer base that today, for many businesses, spans the globe is a huge industry in itself. In this e-guide we look at the technologies that the businesses that operate in the logistics sector are investing in. As the headline suggests, Blockchain and the Internet of Things technologies are amongst them.

  • Solve for X

    Sponsored by: 8x8

    Download this guide to conversation AI in the contact center to learn the 4 big benefits of using AI for customer engagement, as well as 4 tips to create exceptional self-service experiences.

  • Verizon ABM with Intent: Front Line Success at Scale

    Sponsored by: TechTarget

    Dive into this case study to examine how Verizon Business Group, a division within one of the world’s largest telecoms firms, for a strong example of how a team has implemented ABM concepts at scale to realize broad benefits across many business areas.

  • CW APAC, May 2022: Trend Watch: Datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on datacentres in the Asia-Pacific region, Computer Weekly looks at the shift towards colocation facilities.

  • Practical Zero Trust Implementing Protections for High-Value Data

    Sponsored by: Zentera Systems Inc.

    This e-book offers a model for implementing a Zero Trust security strategy to protect high-value data. Learn to apply Zero Trust principles like segmentation, identity-based access, and continuous monitoring to secure sensitive information. Download the e-book for practical examples and a software-based approach to Zero Trust.

  • How the application integration landscape is changing

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we discover how the industry is trying to make it possible to link applications together in order to share resources with ease. We take a look at how technologies like Distributed Computing and the Common Object Model have been refined into web services, service-oriented architecture and composable applications and microservices.

  • Atlassian Approach to ESM

    Sponsored by: Atlassian

    "Enterprise Service Management – often referred to as ESM – is the extension of IT Service Management (ITSM) practices to service teams across an organization," this e-book by Atlassian explains. Dig into the 41-page book to unlock a deep dive into one approach to ESM: Jira Service Management.

  • Build An Efficient IT Foundation For Modern Business Success

    Sponsored by: Red Hat

    This Red Hat white paper outlines a five-step approach to modernize your IT infrastructure. The first step? Standardize your IT for consistency. Discover the next 4 steps in this white paper.

  • Infographic: Top 10 Technology Trends 2019

    Sponsored by: TechTarget ComputerWeekly.com

    In this infographic, discover the top 10 technology trends for 2019 as predicted by Gartner. For digital-minded CIOs, Gartner's 2019 top 10 technology trends should come as no surprise: IT is getting smarter, casting an intelligent digital web over the enterprise -- and everywhere else.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.