WHITE PAPER:
This white paper provides and overview of the Intel® Tera-scale Computing Research Program, Intel's overarching effort to shape the future of Intel processors and platforms. Learn about the heart of Intel's research-achieving c...
WHITE PAPER:
This article gives 8 Simple Rules that you can add to your palette of threading design methods. By following these rules you will have more success in writing the best and most efficient threaded implementation of your applications.
EZINE:
In this week's Computer Weekly, we announce this year's list of the 50 most influential women in UK technology. We talk to Suki Fuller, who topped the list, about her journey in IT and the importance of diversity and inclusion. And we meet our rising stars – the women on a trajectory to influence the UK tech community. Read the issue now.
INFOGRAPHIC:
As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
EGUIDE:
Mondelez operates a large supply chain and manufacturing footprint to produce well-known snacks such as Cadbury chocolates and Oreo biscuits. In this e-guide, read how Mondelez tapped low-code/no-code development, drones and other emerging technologies, to deliver productivity gains, better employee experience and higher production yields.
INFOGRAPHIC:
Enterprise Strategy Group (ESG), an IT analyst firm owned by Computer Weekly publisher TechTarget, has published research about generative AI (GenAI) enterprise use cases that shows the concept ranking higher than sustainability and cloud migration as a strategic priority for enterprise IT globally.
EZINE:
In this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.
EGUIDE:
Read this e-book to gain guidance on how to establish an employee-centric digital workplace, including must-see security considerations for which everyone is responsible.
ESG:
ESG recently conducted a survey to understand whether, and to what degree, an organization’s adoption of technologies and processes that enable flexible IT service delivery are correlated to IT and business benefits, as well as key challenges they may face by lagging behind. Open up this white paper to uncover key findings from the study.