HTML5: Painting with Canvas
By: Intel View more from Intel >>
Download this next:
CW Benelux ezine August 2016
By: TechTarget ComputerWeekly.com
Type: Ezine
The Dutch are renowned for being creative with technology and the country has a deep history in art, boasting some of the most celebrated painters for example. It is therefore apt that the combined tech brains of ING, Microsoft the Technical University of Delft and other contributors created The Next Rembrandt, which is a visual showcase for big data.
The new portrait in the style of Rembrandt van Rijn was put together by a combination of big data technology and 3D printing. All of Rembrandt’s 346 paintings were analysed with data analytics making possible to create a seemingly genuine Rembrandt image, while a 3D printer made accurate emulation of his paint patterns a reality.
Also in the Netherlands we feature a case study about how The Hague is solving a bike parking headache with a mobile app.
These are also closely related to: "HTML5: Painting with Canvas"
-
Total Cost of Ownership: UCaaS vs. On-Premise UC
By: CBTS
Type: Resource
A typical TCO analysis comparing UCaaS and on-premise UC only focuses on monthly recurring costs (UCaaS) versus upfront capital and maintenance costs (on-prem) – which paints only a partial picture.
Access this resource to know what a complete TCO analysis of UCaaS vs. on-prem UC should entail, including:
- Data center costs
- IT staff costs
- OpEx vs. CapEx
- And more
-
DevSecOps delivers better business
By: TechTarget ComputerWeekly.com
Type: eGuide
Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it’s time for you to find out how and why.
Find more content like what you just read:
-
Brand Trust: One Cyberattack Is Enough to Lose Consumer Trust and Custom
By: Mimecast
Type: White Paper
According to a recent study, consumers agree they would stop spending money with their favorite brand if they fell victim to a phishing attack leveraging that brand. This white paper provides an overview of the dangers that phishing and other cyberthreats pose to organizations. Access the full white paper now to learn more.
-
March ezine: Making tracks to SD-WAN growth
By: MicroScope
Type: Ezine
SD-WAN is a technology on the rise and there are clearly plenty of channel opportunities out there for those that get a firm grip on deployment and installation
-
Accelerate growth and improve competitiveness with artificial intelligence
By: AWS
Type: eBook
It’s time to achieve your own AI success. Grab a copy of this e-book to browse a compendium of case studies in which 10 leading companies are successfully using AI with AWS to drive innovation, improve the customer experience, boost application performance, and automate business operations.
-
CW ANZ: Fix the weak links
By: TechTarget ComputerWeekly.com
Type: Ezine
In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.
-
CW ASEAN: Defend against disruption
By: TechTarget ComputerWeekly.com
Type: Ezine
In this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.
-
Quick guide to edge computing for IoT
By: Cradlepoint
Type: White Paper
By 2025 approximately 45% of the world’s data will be moved closer to the network edge, a global survey predicts. So, how can you facilitate connectivity at the edge to prepare for that shift? Unlock insights in this white paper.
-
Leader’s guide to FDA pre-market cybersecurity requirements
By: Cybellum
Type: eBook
To deepen your understanding of the FDA’s pre-market cybersecurity requirements for medical devices, take a look through this 23-page e-book.
-
How to elevate your content with compelling storytelling
By: BrightTALK by TechTarget
Type: BrightTALK Webinar
To create compelling content, marketers must tell their brand stories effectively and creatively. The best B2B storytellers employ narrative and graphic techniques that emotionally appeal to buyers and inspire long-lasting waves of engagement. Watch this webinar to learn more.
-
Guide to measuring behavioral change in cybersecurity
By: SoSafe
Type: eBook
82% of data breaches involve a human element, according to a report by Verizon. Therefore, ensuring that your workforce can identify cyberthreats is key to a strong security posture. To enhance your employees’ security awareness, this e-book argues, you should consider measuring behavioral change in cybersecurity. Read on to learn why – and how.
-
Does your webinar brand resonate with buyers?
By: BrightTALK by TechTarget
Type: eBook
From landing pages to email promotions, learn how to develop a strong webinar brand that helps share your message and builds excitement across your audience.
-
DRaas and the key decision points in DR-as-a-service
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we look at the key decisions you'll need to make about the blend of DRaas your organisation wants, which of the key cloud providers are best for which elements of DR service delivery, the pros and cons of moving elements of disaster recovery to the cloud and which to keep closer to home, and the 12 key steps to DRaas deployment.
-
17-page e-book: How to sell managed network services
By: Auvik Networks, Inc.
Type: eBook
From selecting prospects to closing deals, discover guidance for selling managed network services in this 17-page e-book.
-
3 Critical Elements to a Successful Mobile Strategy
By: Gozio Health
Type: eBook
Download this eBook to discover the top 3 elements you should consider when designing the right mobile strategy for your hospital or health system.
-
Build a better webinar: Storytelling & scripting
By: BrightTALK by TechTarget
Type: BrightTALK Webinar
The best webinars tell a clear and concise story that captures an audience’s attention. You may be a seasoned presenter, but do you use the elements of good story telling to connect emotionally with your audience? Watch this webinar to learn more.
-
A Computer Weekly buyer's guide to network upgrades for cloud-native infrastructure
By: TechTarget ComputerWeekly.com
Type: eGuide
With enterprises increasingly turning to digitisation and cloud computing, there is renewed interest in networking and a greater need for agility. In this 15-page buyer's guide, Computer Weekly looks at what IT decision-makers should be thinking about in their adoption of cloud-native applications.
-
A Computer Weekly buyer's guide to video conferencing and collaboration
By: TechTarget ComputerWeekly.com
Type: eGuide
In this 17-page buyer's guide, Computer Weekly looks at how employers can support a future of flexible working, with video conferencing, collaboration, augmented reality and unified comms technologies all lined up to play a part.
-
What will a quantum datacentre look like?
By: TechTarget ComputerWeekly.com
Type: Infographic
IBM has updated its quantum computing roadmap to reflect how quantum processors, central processing units (CPUs) and graphics processing units (GPUs) will be woven into a compute fabric capable of solving computationally complex problems. Understand why this impacts both hardware installation and software.
-
A Computer Weekly buyer's guide to communications as a service
By: TechTarget ComputerWeekly.com
Type: eBook
As communications needs evolve, organisations must keep pace with the latest services available. In this 15-page buyer's guide, Computer Weekly looks at how we arrived at current-day comms systems, the growing popularity of CPaaS and the advantages of cloud-based offerings in the new normal of hybrid working.
-
Infographic: 2019 Europe IT Priorities - Security
By: TechTarget ComputerWeekly.com
Type: eGuide
In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.
-
7 risk mitigation strategies to protect business operations
By: TechTarget ComputerWeekly.com
Type: Infographic
Risk mitigation strategies must not only identify risks and threats, but also stress the importance of identifying vulnerabilities that could open the door to risk events. In this infographic, we put together the seven most widely used risk mitigation strategies with to help business keep their data safe.
-
A Computer Weekly buyer's guide to modern software development practices
By: TechTarget ComputerWeekly.com
Type: eGuide
The software development landscape is forever changing. In this 15-page buyer's guide, Computer Weekly looks at what it means to be a modern software developer, what's driving their innovation and how artificial intelligence can help build applications that make customers happy.
-
A Computer Weekly buyer's guide to modern software development practices
By: TechTarget ComputerWeekly.com
Type: eGuide
The software development landscape is forever changing. In this 15-page buyer's guide, Computer Weekly looks at what it means to be a modern software developer, what's driving their innovation and how artificial intelligence can help build applications that make customers happy.
-
Are your identity security practices keeping up?
By: WatchGuard Technologies, Inc.
Type: Infographic
According to a recent report, in 2022 74% of breaches involved a human element, including stolen credentials and other identity-related resources. Download this infographic to unlock 5 questions that help you choose the right identity security solution.
-
A Computer Weekly buyer's guide to customer and employee experience management
By: TechTarget ComputerWeekly.com
Type: eBook
Businesses are facing new challenges to meet the expectations of customers and employees. In this 14-page buyer's guide, Computer Weekly looks at the benefits of the experience economy, the customer service implications of always-on mobile users and how digital platforms can engage customers across all channels.
-
Infographic: 2019 Europe IT Priorities - Datacentre
By: TechTarget ComputerWeekly.com
Type: eGuide
In this infographic, we take a look at what technological elements of the datacentre are expected to be the most important in 2019, the most popular datacentre projects and which technologies and services are being deployed. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.
-
Security Think Tank: Critical National Infrastructure
By: TechTarget ComputerWeekly.com
Type: eGuide
We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
-
Converged infrastructure fundamentals
By: TechTarget ComputerWeekly.com
Type: eGuide
Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive. The day of converged infrastructures has arrived.
-
Converged infrastructure fundamentals
By: TechTarget ComputerWeekly.com
Type: eGuide
Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive. The day of converged infrastructures has arrived.
-
RSA Conference 2020 guide: Highlighting security's human element
By: TechTarget ComputerWeekly.com
Type: eGuide
The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.
-
Backup deduplication: a complete guide
By: TechTarget ComputerWeekly.com
Type: eGuide
There are many elements to consider in picking the backup deduplication technology that fits best. How do zone-level and block-level deduplication compare? What about inline versus post-processing deduplication? What are the differences between deduplication and compression? Check out this complete e-guide to backup deduplication.
-
Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.
-
Is your infrastructure orchestration platform secure?
By: Orchestral.ai
Type: Product Overview
Because infrastructure orchestration platforms have access to data and configurations throughout a network, organizations must ensure that these platforms are secure. To learn about four key security components of such a platform, take a look through this overview.
-
Real-time analytics possible fuel for post Covid pandemic growth
By: TechTarget ComputerWeekly.com
Type: eGuide
Real-time analytics promises the last word in business agility. There is obvious business value in being able to react immediately to changing patterns in customer behaviour or to prevent problems ahead of time, to give but two examples. And becoming more real-time could be an element in accelerating economic growth beyond the pandemic.
-
Computer Weekly – 17 January 2023: How PepsiCo works with tech startups to drive growth
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we talk to food and drinks giant PepsiCo, about how it works with tech startups to drive growth and digital transformation. Our latest buyer's guide examines the key elements of a composable business. And with all the chatter about ChatGPT, we look at the implications of generative AI. Read the issue now.
-
Why less than 10% of organizations are aligned
By: Atlassian
Type: Infographic
In this solution brief, get an overview of recent investments in visibility and control across Atlassian Administration, and how Cloud Enterprise offers advanced functionality for admins to keep their growing organizations ahead of the curve.
-
Enhancing database security with Zero Trust
By: Trustwave
Type: White Paper
Browse this white paper to discover why and how to apply Zero Trust to your business’s database security.
-
Enterprise IoT: Edge Computing Buyers’ Guide
By: Cradlepoint
Type: White Paper
To support their bandwidth-intensive IoT technologies, many organizations have turned to edge computing. Is your business considering doing the same? Check out this buyer’s guide.
-
OpenText vs. Microsoft for data masking
By: OpenText
Type: Gartner Research Report
Data masking enables organizations to transform sensitive data elements to ensure the original values are not identifiable when used in app testing environments. This Gartner “Voice of the Customer” report compares the top data masking vendors on the market, including OpenText, Microsoft, Oracle, and Broadcom. Dive into the Gartner report here.
-
A Computer Weekly buyer's guide to cloud-native architectures
By: TechTarget ComputerWeekly.com
Type: eGuide
Cloud-native architectures are seen as the future for businesses. In this 16-page buyer's guide, Computer Weekly looks at the influence of DevOps and microservices-based technology, the continued importance of security in containers for software development and the suitability of Microsoft Azure for deploying cloud-native applications
-
Supporting sustainability efforts with AI and data
By: Avanade
Type: White Paper
Not only are government and public agencies pursuing their sustainability objectives – they’re often also responding to and predicting climate events. To find out how data and AI can support agencies’ sustainability work, check out this white paper.
-
How Brexit will affect your security online
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, DevOps is cited as a key element of digital transformation – we examine the challenges to delivering on its promise. Many retailers are investing in emerging technologies to gain an edge – but are they too far ahead of the curve? And could a new spirit of collaboration help UK broadband roll-out? Read the issue now.
-
How to think cloud-native
By: VMware Tanzu
Type: White Paper
We are still in the infancy of cloud-native in the wider IT world. Which leads to questions like, what is cloud-native, how do you implement it, and what benefits can it truly bring you? This white paper answers all these questions and more, touching on cloud-native elements like DevOps, containers, microservices, and security. Read it here.
-
Augmented analytics tools: a complete guide
By: TechTarget ComputerWeekly.com
Type: eGuide
Augmented analytics tools are designed to simplify the BI and analytics process for business users and citizen data scientists. They've become featured elements in new software releases from BI vendors. This e-guide offers insights into the technology's potential uses and critical issues.
-
A complete guide to video conferencing enabled room design
By: Shure Inc.
Type: Blog
There are a variety of elements that go into conference room design, especially when adding in solutions for video conferencing. Access this blog to help you break down the components needed to put your conference room together and make it functional.
-
Computer Weekly – 9 May 2017: Casting the IT skills net wider
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.
-
Understanding the modern EDR market: Buyer's guide & more
By: iT1 Source
Type: Buyer's Guide
To understand the four elements of modern endpoint detection and response (EDR) and how to find a solution that can deliver them, take a look through this buyer’s guide.
-
Project Portfolio Management 101
By: ServiceNow
Type: White Paper
As your business adopts new technologies and processes to stand out in the evolving marketplace, ensuring strong project portfolio management (PPM) becomes crucial. Check out this white paper for a PPM deep dive.