ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "open group computer weeklystart=20start=10start=30start=10"

  • A Computer Weekly buyer's guide to the circular economy

    Sponsored by: TechTarget ComputerWeekly.com

    Increasing environmental concerns have made companies consider the circular economy model. In this 17page buyer's guide, Computer Weekly looks at how organisations can become more sustainable, whether Amazon's server pledge will catch on and how CIOs can adapt their procurement strategies to fight climate change.

  • Computer Weekly – 12 January 2021: Can AI ever match the power of the brain?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, artificial intelligence is still no match for the brain – we talk to Intel's neuromorphic computing lab to see how researchers are trying to address that. Our buyer's guide examines identity and access management. And we find out why datacentres are becoming a new target for financial investors. Read the issue now.

  • Accelerating Wireless-Wireline Network Convergence

    Sponsored by: American Tower

    This e-book explores how wireless-wireline network convergence can enable the metaverse, Omniverse, and future digital infrastructure. Inside, you'll learn how data centers, towers, and edge computing can work together to deliver low-latency, high-capacity services. Read the e-book now to learn more.

  • Top 10 software development stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    There has never been a better time to be in software development. After years of being regarded as non-core, software development has quickly become a differentiator as businesses embark on digital transformations. Here are Computer Weekly's top 10 software development articles of 2019.

  • Enterprise 2030: Building The AI Powered Company Of The Future

    Sponsored by: Teradata

    Access this research report to learn why the most future-ready organizations will be the ones that make AI a competitive advantage, as well as 4 steps business leaders can take today to accelerate their transformations, starting with evaluating their data and AI maturity.

  • Threat Intelligence Report 2024

    Sponsored by: NOKIA

    The latest Threat Intelligence Report from Nokia explores emerging cybersecurity trends and technologies impacting the telecom industry. Gain insights into global attack patterns, DDoS threat evolution, and the role of AI and quantum computing. Download the full report to stay ahead of evolving cyber threats.

  • Computer Weekly – 6 June 2017: General Election 2017: Who gets the tech vote?

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of Computer Weekly, as the UK votes for a new government, examine the digital policies in the manifestos of the Conservative, Labour and Liberal Democrat parties, and hear what IT trade body TechUK would like to see for the tech sector from the next administration. Read the issue now.

  • CW ASEAN: Connect your people

    Sponsored by: TechTarget ComputerWeekly.com

    Unified collaboration (UC) is transforming the way business is done globally. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises are embracing UC tools, factors that organizations should consider when developing a UC strategy, and the emergence of startups that have been shaking up the marketplace.

  • Computer Weekly – 6 March 2018: Getting up to speed with 5G

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at what needs to be done to make next-generation 5G mobile networks a reality. Fewer EU workers are moving to the UK – we examine what that means for the IT skills gap. And we analyse the state of the hyper-converged infrastructure market. Read the issue now.

  • CW Benelux February 2018

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.