ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=30start=10start=30start=30start=30"

  • CW Benelux - February-April 2021: Is reluctance to report cyber crimes in the Netherlands helping the criminals to get away?

    Sponsored by: TechTarget ComputerWeekly.com

    According to an academic study in the Netherlands, only one in seven Dutch people report a cyber crime to the police when it happens - feeling it is better to sort the problem out themselves because they don't think the police will do anything.

  • A Computer Weekly buyer's guide to data quality

    Sponsored by: TechTarget ComputerWeekly.com

    The value of data depends on its quality. In this 14-page buyer's guide, Computer Weekly looks at how the coronavirus pandemic has highlighted the challenges of inaccurate datasets, the new analytics techniques improving data quality and Informa's use of Collibra software

  • A Computer Weekly buyer's guide to NoSQL

    Sponsored by: TechTarget ComputerWeekly.com

    There's a lot of data out there, much of which doesn't need to be stored in heavyweight relational databases complete with complex query languages. In this 13-page buyer's guide, Computer Weekly looks at a new category of NoSQL data stores and how they are being used.

  • Secure remote access: More vital than ever thanks to Covid-19

    Sponsored by: TechTarget ComputerWeekly.com

    We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.

  • Why zero trust is IT security's best hope

    Sponsored by: TechTarget ComputerWeekly.com

    This guide provides both overarching advice and specific guidance on how to deal with particular issues, including cloud and legacy tools, app development and more. Learn the ideas and approaches that underpin zero trust, and also get solid ideas on where to begin to make it a reality.

  • How to build a machine learning model in 7 steps

    Sponsored by: TechTarget ComputerWeekly.com

    Organizations are implementing AI projects for numerous applications in a wide range of industries. But building a viable, reliable and agile machine learning model takes patience, preparation and perseverance. In this e-guide, we take a look into the main steps for building an efficient machine learning model.

  • CW APAC - June 2021: Career guide to cloud computing

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at the skills required for cloud professionals to succeed in an evolving industry, the risk to jobs posed by automation and the disciplines being taught at Future Tech Academy

  • The Big Book of Machine Learning Use Cases – 2nd Edition

    Sponsored by: DataBricks

    This E-book contains a collection of technical blogs, including code samples and notebooks, designed to equip you with practical machine learning use cases you can put to work right now. Read on to gain insights from industry thought leaders and learn how you can leverage machine learning to bring your business into the future.

  • How To Modernize Your Data For A Resilient And Efficient Manufacturing System

    Sponsored by: T-Systems

    In this whitepaper, you’ll discover how advanced data management and data analysis technologies enable manufacturers to leverage their data treasures to increase the resilience of their manufacturing systems and supply chains and make them safe and secure for the future. Read on to learn how you can make the most of your manufacturing data.

  • A Computer Weekly Buyer's Guide to Containers and Microservices

    Sponsored by: TechTarget ComputerWeekly.com

    In this 13-page buyer's guide, Computer Weekly looks at how the architectures are configured, the suppliers building them – and the benefits to the organisation using them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.