ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=20start=30start=10start=20start=10start=10"

  • Digital Revolution: Moving towards agility

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about Citic Pacific Mining's success, the role of the CIO and chief digital officer at GE, and how Australia is planning to develop its digital competencies.

  • Computer Weekly – 25 April 2023: Aston Martin Formula One: Driven by data

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we speak to Aston Martin Formula One's Clare Lansley to find out how digital transformation helps the team to move further up the F1 grid. We explore how automation and AI is helping businesses tackle rising costs and also look into the maturity of Industry 4.0 initiatives. Read the issue now.

  • Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men's support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now.

  • CW Middle East - April-June 2022: UAE and UK researchers work on 'trustworthy' cloud OS for datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    Imperial College London is embarking on a three-year project with an Abu Dhabi-based group of researchers to find ways for datacentre operators and cloud providers to secure their infrastructure. Also read how Dubai is positioning itself to reap the benefits of a promising global market for drone technology.

  • How to Capitalize on the Edge Computing Opportunity

    Sponsored by: Schneider Electric

    Discover how managed service providers and value-added resellers can leverage edge computing. Learn best practices, essential capabilities, tools, and partnership-building in this white paper to expand your edge expertise and presence.

  • Converged infrastructure fundamentals

    Sponsored by: TechTarget ComputerWeekly.com

    Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive. The day of converged infrastructures has arrived.

  • Converged infrastructure fundamentals

    Sponsored by: TechTarget ComputerWeekly.com

    Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive. The day of converged infrastructures has arrived.

  • CW APAC - May 2021: Buyer's guide to HR software

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on HR software in the Asia-Pacific region, Computer Weekly looks at the considerations when choosing a human resource management application

  • Quantum computing in action

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at Finland and how state investment is being used in a milestone project involving public and private sector organisations to understand the applications of the technology. And we hear how Spanish bank BBVA is examining the complex financial problems that could be solved by quantum computing.

  • Attacker Economics

    Sponsored by: SailPoint Technologies

    Threat actors target privileged access to infiltrate systems, exfiltrate data, and disrupt operations. This infographic outlines the attacker economics behind these tactics and how an identity-first security strategy can improve cyber resilience. Read the full infographic to assess your identity security posture.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.