ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "open group computer weeklystart=20start=10start=30"

  • Mobile Payments Using Host Card Emulation with NFC

    Sponsored by: TechTarget ComputerWeekly.com

    In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.

  • How to Get Everyone On-Board with a Cloud Migration Project

    Sponsored by: New Relic

    In this expert guide, discover five cloud benefits that may prove cloud migration naysayers wrong, including scalability and agility, visibility and governance, cost, and more.

  • Three Proven Tips for Delivering Full-Stack Scalable Apps at Speed

    Sponsored by: AWS

    Full-stack development makes it simple with complete ownership and end-to-end visibility—so your teams can accelerate time to market, increase agility, and realize greater cost efficiency. Speed up the development of mobile and web applications with:Modern tools and frameworksModern APIsModern compute

  • 12 AI And Machine Learning Use Cases In ITSM

    Sponsored by: Atlassian

    Today, CIOs are starting to use different AI and machine learning capabilities to improve ITSM processes. Access this e-guide now to learn about 12 AI and ML use cases in ITSM that you can use to get more out of your data.

  • Optimizing Care With AI And Machine Learning

    Sponsored by: XSOLIS

    Download this white paper to understand the pitfalls of traditional utilization management and review (UM/UR) strategies in healthcare and explore the potential of a purpose-built tool that leverages AI and ML to remove subjectivity in the UM/UR process, leading to improved outcomes for payers, providers, and patients.

  • Assess & Manage Commercial Software Risk

    Sponsored by: ReversingLabs

    How do you know the commercial software you bring into your organization is safe? With Industry analysts seeing a 300% to 1000% increase in attacks targeting the commercial software businesses, it represents the largest under-addressed attack surface. Download this White Paper to learn more.

  • Technology industry at the cross-roads: Transforming quote-to-cash operations

    Sponsored by: TechTarget ComputerWeekly.com

    This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process.

  • Cloud storage hits hybrid mainstream

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take an in-depth look at what is pushing cloud, and more specifically hybrid cloud, into the mainstream and how the rise of cloud applications has driven innovations in backup, with data protection of cloud assets to the cloud arising.

  • Flash hits the cloud while NVMe flash goes mainstream

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we will major on NVMe, the stance towards it of the big five storage makers and the varying architectures marketed to the market. We also look at deploying NVMe in the enterprise and in particular for AI use cases. We also look at contemporary scale-out NAS products and flash options offered by the key cloud providers.

  • TechTarget's Guide to Managing Multiple AWS Accounts and Resources

    Sponsored by: TechTarget Cloud Computing

    Managing multiple AWS accounts can be challenging, but this guide simplifies the process. Learn best practices for using AWS Organizations, resource hierarchy, and AWS Control Tower to streamline account management, governance, and automation for more efficient cloud operations.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.