ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "open group computer weeklystart=20start=10start=30start=10"

  • Serving up server hardware

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, find out why some companies are still hanging on to older hardware, the pros and cons of different types of server hardware, and what one Chinese tech giant is doing in the microprocessor space.

  • A Computer Weekly buyer's guide to supply chain resilience

    Sponsored by: TechTarget ComputerWeekly.com

    The Covid-19 pandemic has put the limits of the supply chain to the test. In this 18-page buyer's guide, Computer Weekly looks at how supply chain management has changed since, what action has been taken to handle it, and why data and automation is enhancing adaptability.

  • Computer Weekly – 11 September 2018: Retailers buy into AI – the rise of artificial intelligence in retail

    Sponsored by: Oracle Cloud

    In this week's Computer Weekly, we talk to leading high street and online retailers to find out how they are using AI to get more from their customer data. New research suggests outsourcing is bad for software development – we assess the issues. And we look at how to ensure data protection when using containers. Read the issue now.

  • Digital identity strategies to enhance data privacy and protect networks

    Sponsored by: TechTarget ComputerWeekly.com

    The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.

  • CW Europe - December 2022 - February 2023: Finland prepares for drone technology take-off

    Sponsored by: TechTarget ComputerWeekly.com

    Finland is preparing for a future where it could rely on flying drone technology. Read about its plans in this issue. Also find out how a PhD student in the Netherlands is helping to detect hidden messages on the internet by using steganography.

  • From fraud detection to protection

    Sponsored by: Teleperformance

    Any company that stores sensitive information is at risk for fraud. Whether it’s financial or personal data, if you have it, there is a good chance someone is trying to get at it. This problem is compounded even more with remote work and the rise of AI. All of this means it’s time to rethink your fraud prevention posture. Read on to learn more.

  • Computer Weekly – 2 May 2017: How to deal with data under GDPR

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.

  • GEP Outlook 2024

    Sponsored by: GEP

    Recent years have had businesses struggling with a myriad of challenges, risks, and concerns, especially for procurement and supply chain leaders. So, how are companies transforming? What trends can you expect going into the new year and how can you best keep up? Browse the report to learn more.

  • Computer Weekly – 19 May 2020: Ocado makes the friendly workplace robot a reality

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how Ocado is making robot-human collaboration a reality. Unified com-munications has become a must-have lockdown capability – we assess the key technologies. And as contact-tracing apps emerge to help deal with the Covid-19 pandemic, we exam-ine the data privacy challenges. Read the issue now.

  • Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.