ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • Modern Adversaries and Evasion Techniques: Why Legacy AV Is an Easy Target

    Sponsored by: CrowdStrike

    According to a recent study, 560,000 new pieces of malware are detected every day. Read this e-book to learn how adversaries are evading legacy AV, including 5 cautionary tales of adversaries in action that will demonstrate why modern endpoint security is the only way to stop breaches.

  • Spotlight: Hong Kong

    Sponsored by: Cloudflare

    In order to shed light on the state of cybersecurity in Hong Kong, Cloudflare has curated data from a recent study that involved over 4,000 cybersecurity decision makers and leaders across 14 markets. Download the report now to learn more about cybersecurity in Hong Kong.

  • Computer Weekly – 19 March 2024: What went wrong with Birmingham's Oracle project?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after Birmingham City Council's disastrous Oracle project cost over £100m, we analyse where it all went wrong. Our new buyer's guide examines building a sustainable IT strategy. And we find out how Thomson Reuters is using AI to enhance its product offerings. Read the issue now.

  • Integrate and simplify production AI with Intel and Red Hat

    Sponsored by: Red Hat and Intel

    Despite attractive benefits, a high AI/ML project failure rate remains, with many experiencing real challenges moving projects from concept to production. Download this product overview to understand how Intel and Red Hat can help you face these challenges directly and rapidly operationalize your AI/ML models.

  • Quantifying Data Center Scope 3 GHG Emissions to Prioritize Reduction Efforts

    Sponsored by: Schneider Electric

    In this white paper, explore how your data center can get started quantifying Scope 3 emissions by identifying the largest emission sources, and try out the essential Scope 3 calculator that estimates your data center’s entire lifecycle footprint.

  • Guide to Environmental Sustainability Metrics for Data Centers

    Sponsored by: Schneider Electric

    In this deep-diving white paper — designed for companies in the data center industry or wishing to report on their data center operations — discover why there 5 often-misunderstood categories for environmental sustainability reporting metrics that need to be at the core of your sustainability strategy.

  • 3 Steps to Calculate Total Enterprise IT Energy Consumption Using DCIM

    Sponsored by: Schneider Electric

    Download this white paper for a straightforward, “how to get started” guide that identifies the fundamental data points to start with and gives a simple 3-step framework to start measuring the environmental impact of the IT estate.

  • An Architect's Checklist: Building a Data Platform to Power the Modern SOC

    Sponsored by: SentinelOne

    To unlock a checklist that can guide you through building a SOC data platform, read this white paper.

  • Cloud Workload Protection Questionnaire

    Sponsored by: SentinelOne

    Can a cloud workload protection platform (CWPP) benefit your organization? To make an informed decision, explore this questionnaire, which poses questions about your business’s strategic baseline of cloud security – and more.

  • Alteryx Special Edition Cloud Analytics Automation

    Sponsored by: Alteryx

    In this 48-page For Dummies e-book, you’ll discover how leveraging the cloud for analytics automation enables enterprise customers to connect their disparate data sources across multiple clouds and their on-premises data centers. Read on to learn how you can get the most out of your data.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.