ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:ComputerWeekly.com

  • CW APAC, April 2022: Trend Watch: Cyber security

    In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access

  • 11 key considerations prior to a data center upgrade

    The key to smooth, successful and meaningful data center upgrades is preparation. Know the goals and the path to each goal, and meet the roadblocks along the way to bring huge benefits to the upgrade process. In this e-guide, learn the 11 key steps you must take to ensure neat migrations, good availability, continued security and limited downtime.

  • CW Innovation Awards Telecommunications Winner: Telekom Malaysia

    Telekom Malaysia has been driving automation efforts across the company, not only to serve customers more efficiently, but also to improve a slew of back office functions. Learn more about why they are the telecommunications project of the year.

  • 9 IBM Cloud Paks for app modernization and cloud efforts

    It takes time, money and labour to modernize applications and workflows to use cloud environments. IBM brings a new dimension to cloud adoption with highly integrated solution stacks that can provide a range of typical workflows for business users. In this e-guide, learn how IBM Cloud Paks can help ease some challenges of application modernization.

  • Royal Holloway: Information security of the 2016 Philippine automated elections

    We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.

  • Business analytics needs underpinnings of sound data and data-skilled humans

    Data analytics for the solution of first-order business problems is probably more important than ever. It is not new. Companies and organisations have been analysing computerised data for many decades. But all sorts of companies now pronounce themselves "data driven". Read more about business analytics trends in this exclusive e-guide.

  • The growth of cloud-based networking: What to expect in 2022 and beyond

    By upgrading to advanced network infrastructure, firms can deliver mission-critical services through cloud providers and through their own cloud resources. These increased capacity need has seen deployment of optical networking and advanced network solution such as software-defined wide area network (SD-WAN). Read more in our exclusive e-guide.

  • Computer Weekly - 12 April 2022: Disney combines digital, data and creativity for ad opportunities

    In this week's Computer Weekly, we talk to Disney Advertising Sales about how it is using data to subserve story-telling excellence. We delve into how rising energy costs negatively impacted the the UK arm of Sungard Availability Services. And we look at the role of infrastructure as code in edge datacentres. Read the issue now.

  • CW Innovation Awards Financial Services Winner: WLTH

    Learn how WLTH, a fintech company, built its own technology stack that delivers data analytics and other capabilities as it seeks to win market share from traditional banks.

  • Risk management is the beating heart of your cyber strategy

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.

  • Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing

    Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.

  • The ultimate guide to Robotic Process Automation (RPA)

    Robotic process automation is a hot commodity in today's enterprises -- its impact has been described as transformational and disruptive. Still, RPA software is not without risks. In this e-guide, we explain everything you need to know for a successful RPA implementation, from the basics to analysis of where this rapidly evolving market is headed.

  • How Russia's war in Ukraine is changing the cybersecurity game and why that matters

    The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.

  • Computer Weekly - 5 April 2022: Police use of AI needs overhaul to prevent abuse

    In this week's Computer Weekly, a House of Lords inquiry calls for a rethink on how police forces use AI technologies – we examine the issues. Our new buyer's guide looks into edge datacentres. And the EU and US agree a new data protection deal to replace Privacy Shield, but will it stand up to scrutiny? Read the issue now.

  • A Computer Weekly buyer's guide to cloud enterprise applications

    Businesses require suitable cloud applications to manage their processes effectively. In this 17-page buyer’s guide, Computer Weekly looks at the advantages of best-of-breed SaaS products, explores the rise of industry cloud and assesses its value in the corporate IT sector.

  • CW Innovation Awards Project of the Year: StratMed

    Named Project of the Year in the Computer Weekly Innovation Awards APAC 2022, StratMed's Integer platform is facilitating data exchanges between healthcare providers and their suppliers to improve transparency in India's healthcare supply chain.

  • Infographic: 4 key SD-WAN trends to watch in 2022

    The challenges of managing networks during a pandemic have prompted many organizations to delay their SD-WAN deployments. These four trends could jump-start an SD-WAN resurgence in 2022.

  • Step-by-step disaster recovery planning guide

    IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.

  • 4 types of server hardware and their pros and cons

    Servers host applications, manage files and perform analytics. Any organization can benefit from the power and versatility that servers provide, but it can be difficult to know which types of server hardware to choose. In this infographic, we take a look into the major types of servers, their advantages and disadvantages.

  • 11 top IoT online courses to boost your career

    Recent research revealed the increasing importance of IoT in industrial applications, predicting that investment in IoT will soon overtake main technologies such as cloud computing, big data analytics and next-generation security. In this infographic, we selected 11 options for learning about IoT, from introductory to advanced levels.

  • 10 AI and machine learning trends

    Artificial intelligence technologies are transforming business processes and society at large. As enterprises expand the uses of AI, this field starts to move towards new domains, such as conceptual design, smaller devices and multi-modal applications. Here are 10 top 2022 trends IT leaders should prepare for now.

  • Big data vs. Machine learning: How do they compare?

    Data is at the heart of every modern enterprise. As more companies master the big data management process, forward-thinking ones are applying intelligent forms of analytics to extract more value from the data in their systems. In this infographic, we take a lot into the concepts of big data and machine learning, how they differ and how they relate.

  • How to build a machine learning model in 7 steps

    Organizations are implementing AI projects for numerous applications in a wide range of industries. But building a viable, reliable and agile machine learning model takes patience, preparation and perseverance. In this e-guide, we take a look into the main steps for building an efficient machine learning model.

  • 7 NAS encryption best practices to protect data

    NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.

  • Computer Weekly – 29 March 2022: Ten years of the Raspberry Pi

    In this week's Computer Weekly, as the Raspberry Pi reaches its 10th anniversary, we look back on how the low-cost computing device went from schools to supercomputers and even into space. Gartner offers tips on how to motivate IT staff in a hybrid working environment. And we meet the Dutch hackers helping to secure the internet.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.