ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "open group computer weeklystart=20start=10start=30"

  • Selecting an Enterprise Platform for Python and Open Source: A Checklist for Buyers

    Sponsored by: Anaconda

    Thanks to its simplicity and versatility, Python remains the gold standard for data science work. The challenge remains: how to select the best Python platform to keep up with the newest techniques and best practices in data science. Access this buyer's guide to gain insights into this decision.

  • Your Path to a Mature AppSec Program

    Sponsored by: Veracode, Inc.

    Due to the sensitive data they contain, applications are often the target of cyberattacks – and unfortunately, application security approaches are rarely equipped to handle today’s threats. Read this e-book to learn how to modernize your application security approach.

  • Robotic Process Automation blends into AI for thoroughly modern ERP

    Sponsored by: TechTarget ComputerWeekly.com

    Robotic Process Automation has emerged in recent years as one way to modernise the ERP systems that run the entire gamut of business processes for many organisations. Download this e-guide and read more about how the advance of the robots continues.

  • CW Europe - June-August 2022: Russia escalates cyber war on Ukraine

    Sponsored by: TechTarget ComputerWeekly.com

    Microsoft has given details of cyber attacks on Ukrainian civilian communications, nuclear safety authorities, and the exploitation of the destruction of Mariupol in a phishing campaign.

  • Computer Weekly Buyer's Guide to services for digitisation and IoT

    Sponsored by: TechTarget ComputerWeekly.com

    In this 13-page buyer's guide, Computer Weekly looksat the use of mid-sized nearshore IT service providers, choosing a cloud-based platform, and how to manage the huge volume of IoT data.

  • CW APAC, November 2021: Expert guide to storage management

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how firms are rising to the storage challenge and Lenovo's viewpoint on the Asia-Pacific region's market opportunities

  • 2024 State of Application Security Report

    Sponsored by: CrowdStrike

    8 of the top 10 data breaches of 2023 were related to application attack surfaces. This report synthesizes data collected from a survey of application security professionals to reflect the current state of application security, condensing the findings into 8 key takeaways. Download now to learn more.

  • CW ANZ – February 2019: Home in on storage minutiae

    Sponsored by: TechTarget ComputerWeekly.com

    In this edition of CW ANZ, we look at how organisations are using storage analytics to manage their storage footprint and what suppliers are doing to help enterprises get the most of out of the technology.

  • 3 key uses cases for Programmable Voice

    Sponsored by: Sinch

    Explore how programmable voice can enhance customer experiences, localization, and user privacy. Learn about key use cases like text-to-speech for multilingual support, number masking for privacy, and in-app calling to improve last-mile delivery. Read the e-book to discover how programmable voice can benefit your business.

  • Four Ways To Get More Value From Your AVEVA™ PI System™ Data

    Sponsored by: Aveva

    In this e-book, you'll learn how leading industrial companies get more value from their AVEVA PI System data through real-time analytics, predictive maintenance, and secure data sharing. Read on now to explore four ways to maximize your investment in AVEVA PI System.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.