Search Results for "computerweekly freeform dynamicsstart=30start=10start=30start=10start=30start=30start=30"
-
Secure remote access: More vital than ever thanks to Covid-19
Sponsored by: TechTarget ComputerWeekly.comWe explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
-
How to build a machine learning model in 7 steps
Sponsored by: TechTarget ComputerWeekly.comOrganizations are implementing AI projects for numerous applications in a wide range of industries. But building a viable, reliable and agile machine learning model takes patience, preparation and perseverance. In this e-guide, we take a look into the main steps for building an efficient machine learning model.
-
The Big Book of Machine Learning Use Cases – 2nd Edition
Sponsored by: DataBricksThis E-book contains a collection of technical blogs, including code samples and notebooks, designed to equip you with practical machine learning use cases you can put to work right now. Read on to gain insights from industry thought leaders and learn how you can leverage machine learning to bring your business into the future.
-
CW APAC - June 2021: Career guide to cloud computing
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly looks at the skills required for cloud professionals to succeed in an evolving industry, the risk to jobs posed by automation and the disciplines being taught at Future Tech Academy
-
How To Modernize Your Data For A Resilient And Efficient Manufacturing System
Sponsored by: T-SystemsIn this whitepaper, you’ll discover how advanced data management and data analysis technologies enable manufacturers to leverage their data treasures to increase the resilience of their manufacturing systems and supply chains and make them safe and secure for the future. Read on to learn how you can make the most of your manufacturing data.
-
Three Steps to Authentic Connections in B2B
Sponsored by: BrightTALK by TechTargetIn today’s B2B marketplace, buyers no longer fall prey to one-size-fits-all marketing campaigns and pushy sales calls. Authenticity is key—and webinars and videos are key to achieving the human touch. They're also consistently ranked as the top performing content marketing tactics. Explore the 3 steps to authentic connections in B2B here.
-
IT Organizations in a Quandary Over Visibility into Cloud Traffic
Sponsored by: GigamonToday, the push for the finalized IETF Transport Layer Security (TLS) 1.3 standard for network encryption continues to affect organization’s decisions. This white paper presents the key findings from a recent study conducted to investigate perceptions and beliefs of end users surrounding the adoption of the TLS 1.3 standard. Read on to learn more.
-
A Computer Weekly Buyer's Guide to Containers and Microservices
Sponsored by: TechTarget ComputerWeekly.comIn this 13-page buyer's guide, Computer Weekly looks at how the architectures are configured, the suppliers building them – and the benefits to the organisation using them.
-
CW APAC, February 2020: Expert Advice: Container Storage
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, focused on storage in the Asia-Pacific region, Computer Weekly looks at how container applications can make companies more agile, the cost benefits of data storage and the most common data storage myths that need to be debunked.
-
CW Middle East Oct to Dec 2016
Sponsored by: TechTarget ComputerWeekly.comIn this quarter's CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world.