ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=20start=20start=30start=30start=20"

  • The state of application modernization 2024

    Sponsored by: Red Hat

    This in-depth e-book explores how organizations are approaching application modernization. Key findings include positive attitudes, continued progress, and the growing use of AI to support modernization efforts. Read on to learn more about the strategies and challenges companies are facing on their modernization journeys.

  • CW ASEAN – December 2018: How to make the right cloud infrastructure choices

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's edition of CW ASEAN, we take a look at the considerations when choosing infrastructure as a service, and what needs to be in place for enterprises to get the most out of the cloud computing technology

  • Computer Weekly – 14 February 2017: Under surveillance – what the Investigatory Powers Act means for business

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the UK government has passed the Investigatory Powers Act, labelled a "snoopers' charter" that expands the scope of state surveillance – but what does it mean for businesses? We find out what digital transformation means in the fire and rescue service. And we examine the public cloud and storage. Read the issue now.

  • How to Manage Unwanted guests in Azure Active Directory

    Sponsored by: One Identity

    Guests in Azure Active Directory-controlled infrastructure need to be treated like the security threats they are. One Identity delivers unified identity security solutions that help customers strengthen their overall cybersecurity posture and protect the people, applications and data essential to business. Read on to learn more.

  • Using digital twins to cut costs and improve safety at Shell

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.

  • Digital Pioneer in Machine Tool Manufacturing Leverages AWS for Seamless Operations

    Sponsored by: AllCloud

    Machine tool manufacturer Schwäbische Werkzeugmaschinen GmbH (SW) completed a mammoth migration project to AWS, enabling them to utilize optimized serverless apps and a seamless infrastructure as a service. Explore the details of the case study.

  • How to enhance your network for the future

    Sponsored by: TechTarget ComputerWeekly.com

    The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.

  • Maximizing the Business Value of AI with a Digital Platform

    Sponsored by: ServiceNow

    As companies enhance digital capabilities, maximizing AI value is critical. This IDC report explores how a digital platform approach can help organizations drive business impact through AI, improve customer experience, and achieve better outcomes. Download the full report to learn more.

  • CW ANZ: Gearing up for 5G

    Sponsored by: TechTarget ComputerWeekly.com

    The potential benefits of 5G are certainly promising in Australia, which is seen as a test bed for 5G services with the country's dense cities and wide open spaces. In this edition of CW ANZ, we look at how Australia is ushering in 5G services and the industries that will get the most out of the technology. Read the issue now.

  • Email Security Buyer's Guide

    Sponsored by: Checkpoint Software Technologies

    Email is currently the number one attack vector, with hackers exploiting the medium to deliver malware, phishing, and other versatile attack types. To help you overcome the challenges presented by email threats, this buyer’s guide to email security breaks down what it means to be an effective email security solution. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.