ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:TechTarget ComputerWeekly.com

  • How to build a machine learning model in 7 steps

    Organizations are implementing AI projects for numerous applications in a wide range of industries. But building a viable, reliable and agile machine learning model takes patience, preparation and perseverance. In this e-guide, we take a look into the main steps for building an efficient machine learning model.

  • 7 NAS encryption best practices to protect data

    NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.

  • 5 cybersecurity myths and how to address them

    Recent studies show that the lack of cybersecurity awareness is still the biggest detriment to an organization's cyber defences. Insufficient training and persistent misinformation are factors that can compromise a cybersecurity operation. In this infographic, we put together some of the top myths around cybersecurity and how you can address them.

  • RPA bots compared: Unattended vs. Attended vs. Hybrid

    Robotic process automation (RPA) bots can be divided into three modes -- unattended, attended and hybrid -- depending on how they operate within the enterprise. In this infographic, we compare the main similarities and differences between the three modes and examine how organizations can benefit from each of them.

  • 5G vs. Wi-Fi 6: What's the difference?

    While several differences between Wi-Fi 6 and 5G exist, the two technologies can be a powerful combination for organizations that are looking for reliability and flexibility when building their network. In this infographic, we dive into the main differences, pros and cons of these two technologies.

  • CW Middle East - April-June 2022: UAE and UK researchers work on 'trustworthy' cloud OS for datacentres

    Imperial College London is embarking on a three-year project with an Abu Dhabi-based group of researchers to find ways for datacentre operators and cloud providers to secure their infrastructure. Also read how Dubai is positioning itself to reap the benefits of a promising global market for drone technology.

  • Computer Weekly - 22 March 2022: One year on from IR35 reforms - why IT skills are harder to find

    In this week's Computer Weekly, a year after IR35 tax reforms were introduced, we assess the impact on the UK's IT talent pool – and it's not looking good. We examine the rise of industry clouds, and how they are changing the market. And we find out how London councils plan to work together on data and innovation. Read the issue now.

  • A Computer Weekly buyer's guide to training programmes and tools

    It's important for an organisation to pick training tools that suit its needs. In this 16-page buyer's guide, Computer Weekly looks at how to cultivate the right learning culture, the best security training options and why post-pandemic reskilling needs to focus on main frames.

  • CW APAC, March 2022: Trend Watch: Storage management

    In this handbook, Computer Weekly looks at how open source is shaping data storage management and this year’s emerging cloud supplier trends.

  • CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa

    Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?

  • Computer Weekly - 15 March 2022: How the tech sector is supporting Ukraine

    In this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.

  • Shields up! Why Russia's war on Ukraine should matter to security pros

    The build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.

  • The metaverse explained: Everything you need to know

    The metaverse is considered to be the next evolution of the internet, and its possibilities are virtually infinite to those who learn how to master this new digital universe. In this infographic, we put together everything you need to know about the metaverse.

  • 4 data privacy predictions for 2022

    Over the last two years, businesses and employees saw their workspace change forever with the rise of hybrid and remote work. All of a sudden, data privacy became a top priority for enterprises all over the world. As attention continues to build, here are four data privacy predictions for 2022 and beyond.

  • Ransomware: The situation at the beggining of 2022

    2021 was a breakout year for ransomware as the cybersecurity attack vector wreaked havoc on organizations around the world. Truth is that this trend is set to continue in 2022 and beyond. In this infographic, we take a look at the worldwide ransomware landscape at the beginning of 2022 and which areas of the globe have been affected the most.

  • Computer Weekly - 8 March 2022: Using technology to protect human rights

    In this week's Computer Weekly, we investigate how technology is being used to tackle human rights abuses worldwide. We offer a step-by-step guide to disaster recovery in the cloud era. And we examine the vital, and successful, role of digital and data in the UK Covid-19 vaccine roll-out. Read the issue now.

  • Infographic: Hybrid network vs. Hybrid network infrastructure

    Hybrid networks and hybrid network infrastructure blend different kinds of equipment, geographic locations, network ownership and technology disciplines. In this infographic, we highlight the main differences between the two models.

  • The 8 best cloud security certifications for 2022

    With the number of enterprise cloud deployments growing by the day, having someone well versed in cloud security is crucial. Many professionals seeking a career in cloud security will turn to certifications to advance their learning. Here are some of the best cloud security certifications to consider in 2022.

  • Infographic: Top big data trends in 2022

    Big data is driving changes in how organizations process, store and analyze data. The benefits are spurring even more innovation. In this infographic, we take a look at four major trends in big data for 2022.

  • Infographic: Four emerging data integration trends

    To build up an effective data and analytics architecture, enterprises should look at leveraging new approaches in data integration. In this infographic, we take a look at four emerging data technologies to consider for future data integration projects.

  • Computer Weekly - 1 March 2022: Post Office Horizon scandal enters public conscience - at last

    In this week's Computer Weekly, 13 years after Computer Weekly first reported on flaws in the Post Office IT system, a public inquiry finally allows victims to reveal the devastating impact on their lives. Enterprises are starting to evaluate the uses of 5G. And we look at how SMEs have turned to e-commerce after the pandemic. Read the issue now.

  • CW Europe - March-May 2022: Luxembourg sees big role in global fintech market

    Read about Luxembourg's aim to play a larger role in the rapidly growing global financial technology market. Also find out how a Siri-like digital assistant will automate the completion of government service requests in Estonia.

  • Infographic: 5 differences between call centers and contact centers

    Call centers and contact centers provide customer service in different ways. Decision-makers should understand which option best fits their organization's needs to optimize CX. Download our exclusive infographic to find out what is the difference between call center vs contact center.

  • Computer Weekly – 29 March 2022: Ten years of the Raspberry Pi

    In this week's Computer Weekly, as the Raspberry Pi reaches its 10th anniversary, we look back on how the low-cost computing device went from schools to supercomputers and even into space. Gartner offers tips on how to motivate IT staff in a hybrid working environment. And we meet the Dutch hackers helping to secure the internet.

  • The Enterprise Guideto Video Conferencing

    The video conferencing guide helps enterprises navigate collaboration in a hybrid work environment and includes best practices for implementation and user training.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.