Search Results for "open group computer weeklystart=20start=10start=30"
-
Selecting an Enterprise Platform for Python and Open Source: A Checklist for Buyers
Sponsored by: AnacondaThanks to its simplicity and versatility, Python remains the gold standard for data science work. The challenge remains: how to select the best Python platform to keep up with the newest techniques and best practices in data science. Access this buyer's guide to gain insights into this decision.
-
Your Path to a Mature AppSec Program
Sponsored by: Veracode, Inc.Due to the sensitive data they contain, applications are often the target of cyberattacks – and unfortunately, application security approaches are rarely equipped to handle today’s threats. Read this e-book to learn how to modernize your application security approach.
-
Robotic Process Automation blends into AI for thoroughly modern ERP
Sponsored by: TechTarget ComputerWeekly.comRobotic Process Automation has emerged in recent years as one way to modernise the ERP systems that run the entire gamut of business processes for many organisations. Download this e-guide and read more about how the advance of the robots continues.
-
CW Europe - June-August 2022: Russia escalates cyber war on Ukraine
Sponsored by: TechTarget ComputerWeekly.comMicrosoft has given details of cyber attacks on Ukrainian civilian communications, nuclear safety authorities, and the exploitation of the destruction of Mariupol in a phishing campaign.
-
Computer Weekly Buyer's Guide to services for digitisation and IoT
Sponsored by: TechTarget ComputerWeekly.comIn this 13-page buyer's guide, Computer Weekly looksat the use of mid-sized nearshore IT service providers, choosing a cloud-based platform, and how to manage the huge volume of IoT data.
-
CW APAC, November 2021: Expert guide to storage management
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly looks at how firms are rising to the storage challenge and Lenovo's viewpoint on the Asia-Pacific region's market opportunities
-
2024 State of Application Security Report
Sponsored by: CrowdStrike8 of the top 10 data breaches of 2023 were related to application attack surfaces. This report synthesizes data collected from a survey of application security professionals to reflect the current state of application security, condensing the findings into 8 key takeaways. Download now to learn more.
-
CW ANZ – February 2019: Home in on storage minutiae
Sponsored by: TechTarget ComputerWeekly.comIn this edition of CW ANZ, we look at how organisations are using storage analytics to manage their storage footprint and what suppliers are doing to help enterprises get the most of out of the technology.
-
3 key uses cases for Programmable Voice
Sponsored by: SinchExplore how programmable voice can enhance customer experiences, localization, and user privacy. Learn about key use cases like text-to-speech for multilingual support, number masking for privacy, and in-app calling to improve last-mile delivery. Read the e-book to discover how programmable voice can benefit your business.
-
Four Ways To Get More Value From Your AVEVA™ PI System™ Data
Sponsored by: AvevaIn this e-book, you'll learn how leading industrial companies get more value from their AVEVA PI System data through real-time analytics, predictive maintenance, and secure data sharing. Read on now to explore four ways to maximize your investment in AVEVA PI System.