ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Management Research

  • Real-Time Legacy Data Use Cases

    Sponsored by: Precisely

    While it can be easy to obsess with cutting edge technology and new data, it’s important to avoid overlooking the value of legacy data. This white paper examines why legacy data is frequently difficult to access in real time and describes 4 use cases that illustrate how impactful legacy data can be when put to real time use. Download it today.

  • Computer Weekly - 5 April 2022: Police use of AI needs overhaul to prevent abuse

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, a House of Lords inquiry calls for a rethink on how police forces use AI technologies – we examine the issues. Our new buyer's guide looks into edge datacentres. And the EU and US agree a new data protection deal to replace Privacy Shield, but will it stand up to scrutiny? Read the issue now.

  • CW Innovation Awards Project of the Year: StratMed

    Sponsored by: ComputerWeekly.com

    Named Project of the Year in the Computer Weekly Innovation Awards APAC 2022, StratMed's Integer platform is facilitating data exchanges between healthcare providers and their suppliers to improve transparency in India's healthcare supply chain.

  • Computer Weekly - 22 March 2022: One year on from IR35 reforms - why IT skills are harder to find

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, a year after IR35 tax reforms were introduced, we assess the impact on the UK's IT talent pool – and it's not looking good. We examine the rise of industry clouds, and how they are changing the market. And we find out how London councils plan to work together on data and innovation. Read the issue now.

  • Data Exploration and Discovery: A New Approach to Analytics

    Sponsored by: Teradata

    Access the following white paper to uncover how when used in conjunction with analytics, exploration and discovery tools can give you access to better decision making capabilities, lower operational costs, and an improved business process overall.

  • 10 Best Practices for Integrating Your Customer Data

    Sponsored by: TIBCO

    In this white paper, learn how to leverage customer information with 10 best practices from industry experts. Download now to learn more about how the following best practices can help you not only better understand your current customers, but target larger audiences with increased accuracy.

  • 4 data privacy predictions for 2022

    Sponsored by: ComputerWeekly.com

    Over the last two years, businesses and employees saw their workspace change forever with the rise of hybrid and remote work. All of a sudden, data privacy became a top priority for enterprises all over the world. As attention continues to build, here are four data privacy predictions for 2022 and beyond.

  • Computer Weekly - 8 March 2022: Using technology to protect human rights

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we investigate how technology is being used to tackle human rights abuses worldwide. We offer a step-by-step guide to disaster recovery in the cloud era. And we examine the vital, and successful, role of digital and data in the UK Covid-19 vaccine roll-out. Read the issue now.

  • Infographic: Top big data trends in 2022

    Sponsored by: ComputerWeekly.com

    Big data is driving changes in how organizations process, store and analyze data. The benefits are spurring even more innovation. In this infographic, we take a look at four major trends in big data for 2022.

  • Infographic: Four emerging data integration trends

    Sponsored by: ComputerWeekly.com

    To build up an effective data and analytics architecture, enterprises should look at leveraging new approaches in data integration. In this infographic, we take a look at four emerging data technologies to consider for future data integration projects.

  • A Computer Weekly buyer's guide to data integration

    Sponsored by: ComputerWeekly.com

    Data integration is increasing in importance for businesses. In this 17-page buyer's guide, Computer Weekly looks at its complex nature, four key trends to assess, which approaches to take when linking IT systems and why Nasa's Ron Thompson regards data as so important.

  • Computer Weekly - 22 February 2022: Think nation-state cyber attacks won't hit you? Think again...

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, with Russian state cyber attacks in the news, we find out why security professionals in every organisation need to remain alert. Our buyer's guide looks at the tools and programmes helping improve IT training. And we look at how the traditional sport of golf is undergoing a digital transformation. Read the issue now.

  • The components and objectives of privacy engineering

    Sponsored by: ComputerWeekly.com

    In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.

  • Accelerating Green Datacenter Progress with Sustainable Storage Strategies

    Sponsored by: FUJIFILM Corporation, Recording Media

    The opportunity exists to disrupt the escalation of energy consumption and waste by the storage infrastructure, improving long-term sustainability, and cost-efficiency, goals. Download this IDC report to examine several sustainable storage strategies.

  • PCI and GDPR Data Protection Requirements Met with Zero Downtime

    Sponsored by: Comforte AG

    Bankart is a card payments processing center which has several files and databases in their network that contain cardholder data, all of which need to be protected from threats. In this case study, learn how Bankart was able to protect the sensitive data by using comforte's SecurDPS.

  • Computer Weekly - 8 February 2022: Exploring the metaverse

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the metaverse is set to become a highly competitive commercial playground –profitable markets but also high-profile failures will follow. IT contractors have been hit by cyber attacks on the firms that pay their wages – we examine the impact. And we ask if it's time to plan for quantum computing. Read the issue now.

  • In data privacy we trust: building a strong information protection strategy in the hybrid era

    Sponsored by: ComputerWeekly.com

    In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.

  • Infographic: Comparing data protection vs. data security vs. data privacy

    Sponsored by: ComputerWeekly.com

    An organization's data is one of its most valuable assets and must be protected accordingly. Because there are so many ways data can potentially be compromised, organizations must take a multifaceted approach to ensure the well-being of their data. This means focusing on three key areas: data protection, data security and data privacy.

  • New Technology: The Projected Total Economic Impact™ Of IBM Cloud Pak For Data

    Sponsored by: IBM

    IBM Cloud Pak for Data provides organizations with a strong platform from which they can unify their data science and AI projects. Access this Forrester Total Economic Impact report to learn how IBM Cloud Pak for Data helped reduce infrastructure management efforts by up to 85%, ETL requests by up to 65%, and offered a PROI of 274% to 459%.

  • Computer Weekly - 11 January 2022: How Pepsi is taking digital to the max

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to PepsiCo's digital director about delivering innovation in customer experience. Our first buyer's guide of 2022 examines hybrid cloud storage. And we find out how Arkwright and Granville from the BBC sitcom Open All Hours are inspiring retailers 40 years on. Read the issue now.

  • MicroScope – January 2022: Squaring up to ransomware

    Sponsored by: MicroScope

    In this issue, discover how to best fend off the ever-increasing threat of ransomware, learn what the next stage of the data warehouse could be, and find out what leading channel experts believe awaits the industry in the year ahead

  • Driving Hosting Revenue with Cyber Protection

    Sponsored by: Acronis

    Access this webcast to learn how LiquidWeb reaps high attach rates and the best practices they use to increase margins and customer satisfaction.

  • Harness data to reinvent your organization

    Sponsored by: Amazon Web Services

    This AWS white paper covers the 3 steps you need to take to become data driven and 5 considerations you need to make as you reinvent your organization. Read on to learn how organizations including Blackboard, Moderna, and Epic Games saw results including accelerated analytics processes, reduced database infrastructure costs and much more.

  • How Digital Twins and Model Ops Operationalize Data Science for Manufacturing

    Sponsored by: TIBCO

    Machine learning (ML) models are immensely useful tools for organizations seeking to build and understand digital twins for their real-life manufacturing processes. Read on to learn how you can quickly optimize manufacturing processes and provide your company with valuable real-time insight on your equipment and processes.

  • Get the Most Out of Kafka with Continuous Learning

    Sponsored by: TIBCO

    Many companies stream event data in real time, frequently on Kafka. Yet these organizations rarely utilize that data as it comes in, instead throwing it into a data lake and analyzing later. But the advent of continuous learning presents the opportunity for real-time insight to happen alongside real-time streaming. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.