Search Results for "open group computer weeklystart=20start=10start=30"
-
A Computer Weekly buyer's guide to big data
Sponsored by: TechTarget ComputerWeekly.comCompanies are switching on to the advantages of big data. In this 13-pagebuyer's guide, Computer Weekly looks at data analytics, how to get value out it and the benefits of process mining.
-
Top 10 IT security stories of 2018
Sponsored by: TechTarget ComputerWeekly.comThe discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
-
CW Benelux - May 2020: IT budgets up in the air as Covid-19 disrupts business
Sponsored by: TechTarget ComputerWeekly.comComputer Weekly's annual IT priorities survey was carried out before the arrival of Covid-19 disrupted business plans. It found that more than half of the IT leaders in the Benelux region expected budgets to be higher this year than last, and digital transformation was to be the main recipient of budget increases.
-
Computer Weekly – 19 September 2017: Can DevOps deliver on its productivity promises?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, DevOps is cited as a key element of digital transformation – we examine the challenges to delivering on its promise. Many retailers are investing in emerging technologies to gain an edge – but are they too far ahead of the curve? And could a new spirit of collaboration help UK broadband roll-out? Read the issue now.
-
Computer Weekly – 22 October 2024: Delivering Olympic IT
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we speak to a former Olympian and CIO of the Paris 2024 Olympic and Paralympic Games about continuous improvement. We also look at new enterprise AI services from major IT providers and assess the unified communications as a service market. Read the issue now.
-
NHS NW London CCG saves time and improves security with TeamViewer Tensor
Sponsored by: TeamViewerNW London CCG was facing many challenges when it came to support, cybersecurity gaps, and centralized management. They needed a remote connectivity tool that offered instant access to servers and devices, while still being fully compliant. Download this case study to see why they chose TeamViewer, and uncover the results realized from the switch.
-
Computer Weekly – 12 January 2021: Can AI ever match the power of the brain?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, artificial intelligence is still no match for the brain – we talk to Intel's neuromorphic computing lab to see how researchers are trying to address that. Our buyer's guide examines identity and access management. And we find out why datacentres are becoming a new target for financial investors. Read the issue now.
-
Computer Weekly – 14 March 2017: UK digital strategy lacks vision and ambition
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the UK government's new digital economy strategy and hear why critics labelled it unambitious and lacking imagination. The recent AWS cloud outage puts the spotlight on cloud and disaster recovery. And we look at the next generation of storage technology. Read the issue now.
-
Innovate And Transform With A Modern Application Platform
Sponsored by: Red HatApplication transformation can help you modernize existing apps and build new cloud-native ones faster. Learn how Red Hat OpenShift provides an integrated platform, tools, and services to accelerate your journey in this e-book.
-
Innovate And Transform With A Modern Application Platform
Sponsored by: Red HatThis Red Hat e-book explains transforming applications for agility and efficiency, covering trends like cloud-native development, AI/ML integration, and legacy app replatforming. The e-book dives into how OpenShift provides a platform to build, deploy, and manage apps with consistency and security. Read the e-book here.