3,426 Results for:Wearable devices and emerging technology

  • Filter by: 

How to manage emerging technology in IT

sponsored by ComputerWeekly.com Published: 10 Feb 2011 White Paper

Different Emerging Information Technologies (EIT) have different impacts upon a business. Some EIT should be used as technical tools for supporting business to make business more efficient or effective; ...

View Now

The Top Emerging Technologies For Digital Predators

sponsored by Mendix Published: 01 Mar 2017 White Paper

The only way for a CIO to survive today is by driving revenue growth and customer value with the use of new technologies. Take a look at this white paper to read about the top emerging technologies that CIOs need ...

View Now

Efficacy of Emerging Network Security Technologies

sponsored by ComputerWeekly.com Published: 29 Apr 2013 IT Briefing

The report, which surveyed 4,774 global IT and IT security professionals across nine countries identifies the challenges enterprises are facing dealing with emerging security threats.

View Now

Emerging Technologies in Cognitive Computing and Machine Learning

sponsored by IBM Published: 31 Oct 2017 Resource

50% of CEOs hope to adopt smart technologies by 2019, according to the Institute for Business Value. Discover how your business can become 'cognitive capable' by finding a platform that provides flexibility with ...

View Now

CW Buyer's Guide: Emerging technologies in networking

sponsored by ComputerWeekly.com Published: 06 Jan 2015 eBook

Check out this extensive buyers' guide to explore technologies that are designed to improve networking, and for an inside glance at what established suppliers are doing to re-invent their offerings.

View Now

Local Authority Guide to Emerging Transport Technology

sponsored by ComputerWeekly.com Published: 10 Oct 2014 eGuide

This will help local authorities make use of new technologies, such as big data analytics and cloud computing, to revolutionise their local transport systems and reduce costs.

View Now

Going Mobile: The Emerging Threat Landscape

sponsored by Check Point Software Technologies Ltd. Published: 14 Jun 2018 Video

For hackers set on stealing sensitive business data, mobile devices are the new back door to the enterprise network. Listen in on this webcast to learn about the latest modes of attack used by hackers to breach ...

View Now

Enabling Agile PPM for Emerging Markets, DevOps, and IoT

sponsored by CA Technologies Published: 31 Jul 2017 Research Content

Explore this IDC vendor assessment to learn about CA Technologies' Agile PPM platform and find out how you can move towards more Agile, automated, iterative app development.

View Now

How Attackers Hack IoT Devices

sponsored by ForeScout Technologies, Inc. Published: 25 Oct 2016 Video

In this video, ethical hacker Samy Kamkar demonstrates how easy it can be for cyberattackers to hack into devices like security cameras. Find out how to anticipate and defend against IoT and other endpoint attacks ...

View Now

Drive Visibility into the Devices Connected to your Network

sponsored by ForeScout Technologies, Inc. Published: 31 Dec 2017 White Paper

If you can't see an unauthorized or noncompliant device on your network, you can't defend against it. Find out how to drive visibility into the devices on your network, without requiring software agents or previous...

View Now