ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=30start=10start=10start=10"

  • Computer Weekly – 1 August 2017: The fields of Athenry – how Apple's datacentre plans are causing turmoil in a small Irish town

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look into Apple's controversial plans to build a huge datacentre in a small town in the west of Ireland, and the local arguments it has caused. We find out how the Met Office is managing its vast quantities of weather data. And we examine Google plans to bring AI to the recruitment market. Read the issue now.

  • Royal Holloway: Protecting investors from cyber threats

    Sponsored by: TechTarget ComputerWeekly.com

    The cyber security of personal investors who use UK investment platforms to manage their pensions or savings is not well understood and not often discussed. In this Royal Holloway security article, we identify the principal cyber threats to investors' assets on UK investment platforms and what can be done to prevent or mitigate these threats.

  • Getting Started with Zero Trust Access Management

    Sponsored by: Okta

    For businesses adopting a Zero Trust security posture, placing identity at the posture’s foundation can assure continuous access assessment without friction for users. Explore this e-book to learn the 4 stages that comprise Okta’s model for enabling identity-centric Zero Trust.

  • Optimize deployment of generative AI models with NVIDIA NIM on AWS

    Sponsored by: AWS & NVIDIA

    Simplify deployment of generative AI models with NVIDIA NIM on AWS. Accelerate inference, optimize infrastructure, and maintain security and control of AI applications and data. Deploy production-grade NIM microservices with NVIDIA AI Enterprise on AWS. Learn more.

  • How Confluence Unlocks Cross-team Collaboration and Boosts Productivity

    Sponsored by: Atlassian

    This guide outlines how Atlassian's Confluence platform consolidates collaboration, enhances visibility, and boosts productivity across teams. Learn how Confluence integrates with Jira and provides universal search to streamline workflows. Read the full white paper to discover how Confluence can benefit your organization.

  • Solving Business Challenges With Data And AI: 5 insights from financial services leaders

    Sponsored by: Elastic

    This report reveals 5 key insights from financial services leaders on leveraging data and AI to address business challenges, improve decision-making, and drive innovation. Discover how you can harness the power of search and AI to tackle your organization's data and technology obstacles. Read the full report.

  • A Better Toolkit for Finding and Converting More Real Leads

    Sponsored by: TechTarget

    Though foundational to B2B marketing, lead generation can pose a couple significant obstacles. Along with unpacking those challenges, this 21-page e-book by TechTarget maps out 3 tips for driving stronger leads from your business’s lead generation strategy. To access those insights and more, dig into the book.

  • White Paper: A modern framework for automating data integration

    Sponsored by: Software AG

    This white paper explores a modern framework for automating data integration, covering key capabilities like subscription, scheduling, orchestration, and a metadata store. Read on now to learn how this framework can help your organization unlock the power of data self-service.

  • A Computer Weekly E-Guide to Network Management & Monitoring

    Sponsored by: TechTarget ComputerWeekly.com

    Covid has introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. SD WAN, SASE and in particular digital transformation are key examples of that.

  • Your Path to a Mature AppSec Program

    Sponsored by: Veracode, Inc.

    Due to the sensitive data they contain, applications are often the target of cyberattacks – and unfortunately, application security approaches are rarely equipped to handle today’s threats. Read this e-book to learn how to modernize your application security approach.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.