Search Results for: top17

CW Middle East - Oct-Dec 2019: Saudi banks trial biometrics in ATMs
Biometric and blockchain technologies are being used in tandem to provide ID verification at Saudi Arabian cash machines.

TechTarget ComputerWeekly.com

Computer Weekly – 25 June 2024: A revolution in space
In this week's Computer Weekly, we talk to astronaut Tim Peake about the imminent revolution in space tech and what it means for IT leaders. AI is set to transform the movie industry – we hear what it means for the producers of the latest Mad Max film. And we find out about plans for Saudi Arabian smart city Neom. Read the issue now.

TechTarget ComputerWeekly.com

The economics of Palo Alto Networks Software Firewalls
Palo Alto Networks Software Firewalls can provide significant benefits like 25% savings in firewall deployment, 50% reduction in security posture attainment time, and 15% reduction in data breach risk. Read the full Forrester Total Economic Impact report to see how your organization could benefit.

Palo Alto Networks

How to enhance your network for the future
The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.

TechTarget ComputerWeekly.com

How to achieve network infrastructure modernization
Upgrading to advanced network infrastructure involves firms being able to deliver mission-critical services through cloud providers and through their own cloud resources. Increased network infrastructure capacity need has seen deployment of optical networking and advanced network solutions such as software-defined wide area network (SDWAN).

TechTarget ComputerWeekly.com

Acceleration-Optimized Servers and Accelerator Portfolio
In this product overview, you'll learn how to accelerate insights and innovation with Dell PowerEdge servers and accelerator portfolios. Read on now to learn how you can leverage the latest technologies like generative AI, large language models, and digital twins to outpace the competition.

Dell Technologies

EDR v XDR v MDR: The cybersecurity ABCs
This e-book provides an overview and comparison of three key threat management services - Endpoint Detection and Response (EDR), Managed Detection and Response (MDR), and Extended Detection and Response (XDR). It offers insights to help you choose the right solution to maximize your cyber protection. Read the full e-book to learn more.

Adlumin

CW Nordics August 2016
The Nordic countries are renowned for being home to thriving tech startup scenes so it is hardly surprising that IT is a disruptive force in the region.

TechTarget ComputerWeekly.com

Computer Weekly – 24 January 2017: World leaders discuss risks of social unrest from advances in technology
In this week's Computer Weekly, we examine the fears raised at the World Economic Forum over the potential for social unrest as technology transforms working practices. We hear from the CIO at the World Health Organization about how IT helped tackle the Ebola crisis. And we look at progress in adopting big data analytics. Read the issue now.

TechTarget ComputerWeekly.com

Computer Weekly – 20 February 2018: The enterprise opportunities for smart speakers
In this week's Computer Weekly as voice-activated smart speakers grow in popularity, we examine how IT teams can use the technology in enterprise applications. Our latest buyer's guide looks at the latest developments in CRM. And UK tech sector leaders tell Parliament why they are so worried about Brexit. Read the issue now.

TechTarget ComputerWeekly.com