ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:ComputerWeekly.com

  • How RPA and machine learning work together in the enterprise

    More enterprises have adopted RPA functions to automate rote, repetitive tasks, but sometimes they need more capabilities. Enter machine learning functions and the result is "intelligent automation" which, unlike RPA, can learn and adapt.

  • Infographic: 6 file transfer best practices

    File sharing is a critical everyday practice across the enterprise. The wide-scale adoption of IM and collaboration tools, as well as cloud-based file-sharing sites, has made the process of sharing data easier -- but also less secure -- than ever. Here are six secure file transfer best practices to avoid exposing confidential data.

  • 2022 India Salary Survey - Future Work Infographic

    The results are in for the 2022 Career and Salary Survey. With over 800 respondents who work in the Indian IT sector, this infographic will give you a snapshot of what was the impact of the pandemic on IT staff, how working arrangements have changed and which topics have become a life priority for those working in tech.

  • 2022 ASEAN Salary Survey - Future Work Infographic

    The results are in for the 2022 Career and Salary Survey. With over 300 respondents who work in the ASEAN IT sector, this infographic will give you a snapshot of what was the impact of the pandemic on IT staff, how working arrangements have changed and which topics have become a life priority for those working in tech.

  • 2022 ANZ Salary Survey - Future Work Infographic

    The results are in for the 2022 Career and Salary Survey. With over 200 respondents who work in the ANZ IT sector, this infographic will give you a snapshot of what was the impact of the pandemic on IT staff, how working arrangements have changed and which topics have become a life priority for those working in tech.

  • 2 types of endpoint encryption to protect data

    Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.

  • BlackCat emerges as one of the top ransomware threats

    After several notable ransomware attacks against major enterprises, the BlackCat gang is drawing the attention of security researchers who have connected it to other groups.

  • UKI 2022 Salary Survey Results

    In this e-guide: We take a look at our 2022 Salary Survey results from over 250 respondents who work in the UKI IT sector. We will be breaking down which job functions get paid what, what areas of IT companies will be investing in in 2022 and the current diversity landscape residing in the UK tech sector.

  • Computer Weekly – 3 May 2022: A prescription for digital accessibility at Boots

    In this week's Computer Weekly, millions of people have difficulties when using websites – we find out how Boots is making its e-commerce offering fully accessible. Our new buyer's guide examines communications as a service. And we talk to Trainline's CTO about how the rail app provider survived and thrived post-pandemic. Read the issue now.

  • How to choose an HR software system: A complete guide

    An HR system is one of the most important purchases an organization makes. Nowadays, the stakes couldn't be higher. The market for HR tools has exploded, and people management has become an urgent priority. In this e-guide, learn all the key steps to identify your needs and pinpoint the features that matter most.

  • How to become an artificial intelligence engineer, step by step

    Artificial intelligence engineers are in great demand and typically earn six-figure salaries. In this e-guide, learn what it takes to launch a rewarding career as an AI engineer, including required skills, responsibilities, qualifications, educational opportunities and top salaries.

  • 5 ways to reduce the cost of Kubernetes

    Cloud computing must support applications efficiently, and cost-effectiveness is a part of that. Unfortunately, many Kubernetes deployments focus on technical operations capabilities and fail to consider the costs associated with their benefits. Here are 5 tips to reduce the cost of Kubernetes.

  • Royal Holloway: Security evaluation of network traffic mirroring in public cloud

    This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.

  • MITRE ATT&CK: Climb to the top

    The purpose of this article is to explain what the MITRE ATT&CK framework is and how it has become the de-facto industry standard for describing cyber adversarial behaviour. It will illustrate why it was created, why it can be considered a burgeoning cyber security ontology, and how it ended up being the one of the most widespread frameworks.

  • Deep learning for countering energy theft – a hybrid long-short term memory approach

    Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.

  • The rise of SD-WANs: Time to cross the chasm

    Where does SD-WAN stand at the beginning of the second quarter of 2022? The solid upward trajectory of SD-WANs has been given further impetus by the parallel emergence and rise of SASE, which integrates SD-WAN with edge security, and the rise persists as SD-WAN pricing becomes more competitive and monitoring capabilities become popular.

  • CW Benelux - May-July 2022: Meta shelves hyperscale datacentre plan in Netherlands

    Meta's plan for a hyperscale datacentre in the Netherlands which was to serve the metaverse world has been halted following a campaign by environmentalists and the Dutch parliament's call for the government to do everything in its power to stop the facility being built. Read about it in this issue of CW Benelux.

  • Computer Weekly - 26 April 2022: The latest salary trends for IT professionals

    In this week's Computer Weekly, the results of our annual salary survey show pay returning to pre-pandemic levels and work-life balance a growing consideration. As sustainability becomes a critical issue, we look at how datacentres can meet emissions targets. And we find out how IT leaders can help protect children online. Read the issue now.

  • Royal Holloway: Cloud-native honeypot deployment

    Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.

  • Top 5 digital transformation trends in 2022

    As organizations move out of crisis mode, CIOs are rethinking their digital transformation strategies. Here are five key areas CIOs are focusing on as we move out of crisis mode and into the future, with Intelligent search, CDPs, AIOps, DevOps/Agile/ITSM claiming the spotlight.

  • 2022 India Salary Survey - Salary Infographic

    The results are in for the 2022 Career and Salary Survey. With over 800 respondents who work in the Indian IT sector, this infographic will give you a snapshot of which job functions get paid what, what IT professionals are thinking in terms of career and their salary expectations for the next year.

  • 2022 ANZ Salary Survey - Salary Infographic

    The results are in for the 2022 Career and Salary Survey. With over 200 respondents who work in the ANZ IT sector, this infographic will give you a snapshot of which job functions get paid what, what IT professionals are thinking in terms of career and their salary expectations for the next year.

  • 2022 ASEAN Salary Survey - Salary Infographic

    The results are in for the 2022 Career and Salary Survey. With over 300 respondents who work in the Indian IT sector, this infographic will give you a snapshot of which job functions get paid what, what IT professionals are thinking in terms of career and their salary expectations for the next year.

  • Infographic: 5 benefits of RPA

    Although hard data on the benefits and drawbacks of robotic process automation (RPA) vary from study to study, some aspects are constantly mentioned by companies that have successfully deployed RPA. From reducing costs to boosting productivity, here are five ways enterprises can improve their business processes through robotic automation.

  • Royal Holloway: Secure multiparty computation and its application to digital asset custody

    For this article in our Royal Holloway security series, the authors provide a brief overview of multiparty computation (MPC) and highlight the benefits of MPC-based bitcoin custody over traditional approaches.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.