You've requested...

Download this next:

Case study: Canva’s journey to one centralized ITSM platform

Canva, a graphic design platform, was scaling quickly and finding it difficult to maintain visibility across workflows and keep up with demand.

Open up this case study to see how Canva teamed up with Atlassian to streamline into one central ITSM platform that has helped them increase collaboration and transparency, and learn how you can do the same in your organization.

These are also closely related to: "HTML5: Painting with Canvas"

  • CW Benelux ezine August 2016

    The Dutch are renowned for being creative with technology and the country has a deep history in art, boasting some of the most celebrated painters for example. It is therefore apt that the combined tech brains of ING, Microsoft the Technical University of Delft and other contributors created The Next Rembrandt, which is a visual showcase for big data.

    The new portrait in the style of Rembrandt van Rijn was put together by a combination of big data technology and 3D printing. All of Rembrandt’s 346 paintings were analysed with data analytics making possible to create a seemingly genuine Rembrandt image, while a 3D printer made accurate emulation of his paint patterns a reality.

    Also in the Netherlands we feature a case study about how The Hague is solving a bike parking headache with a mobile app.

  • How to translate application log files into action

    Application log files don’t always paint a descriptive picture. In fact, most application log files are rendered meaningless without the right management tools and practices in place.

    Download this E-Guide from SearchITOperation.com to find out how to harness application log management tools and guidelines to successfully interpret application log data and generate meaningful insights.

Find more content like what you just read:

  • TCO: UCaaS vs. on-prem UC

    A typical TCO analysis comparing UCaaS and on-premise UC only focuses on monthly recurring costs (UCaaS) versus upfront capital and maintenance costs (on-prem) – which paints only a partial picture. Access this resource to know what a complete TCO analysis of UCaaS vs. on-prem UC should entail.

    Download

  • AWS accelerates the development of no-code ML applications

    Access this TechTarget Content to learn how AWS’s SageMaker Canvas is simplifying the development of applications that use machine learning, radically expanding the ability of companies to leverage AI and ML across their organization.

    Download

  • DevSecOps delivers better business

    Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.

    Download

  • Work wiser with intelligent insights from ActivTrak for insurance

    Access this case study to learn about ActivTrak intelligent solutions & how they can enable insurance companies to identify and resolve workflow bottlenecks, track productivity trends across hybrid, remote, and in-office work settings, find coaching and training opportunities, & more.

    Download

  • DevSecOps delivers better business

    Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.

    Download

  • Benefits of artificial intelligence in invoice data capture

    Explore this white paper to learn about artificial intelligence, what finance departments want from the technology, how artificial intelligence works in data capture, and 5 transformative benefits the technology delivers to the invoice data capture process.

    Download

  • Digital experience monitoring: The power of synthetics & RUM

    60-70% of application performance problems are within the corporate network or the home network/ISP when individuals work remotely, according to a recent report. Tap into this comprehensive white paper to learn how the combination of a synthetic and real-user monitoring (RUM) approach is designed to sustain your digital environments.

    Download

  • A CISO’s guide to reporting cyber risk to the board

    CISOs tend to struggle to connect with boards and paint a clear picture of risk in relation to the business and what return on investment their security stack is deliver. Access this guide to learn how XM Cyber aims to articulate the current cyber risk and the ROI of security tools in a way that’s easy to understand for all.

    Download

  • March ezine: Making tracks to SD-WAN growth

    SD-WAN is a technology on the rise and there are clearly plenty of channel opportunities out there for those that get a firm grip on deployment and installation

    Download

  • CW ANZ: Fix the weak links

    In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.

    Download

  • CW ASEAN: Defend against disruption

    In this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.

    Download

  • eAPM: See a smarter path forward

    Application portfolio management is the way for IT admins to understand app performance. Now Capgemini is introducing Economic APM, or eAPM. Read this 7-page brochure to learn how eAPM combines a proven portfolio assessment methodology with graphical analysis.

    Download

  • ITIL 4 in 10 minutes

    You want an introduction to ITIL 4 or, perhaps, more information. But you don’t have the time to read the 122-page ITIL Foundation: ITIL 4 Edition book. No problem. In this quick start guide to the latest ITSM framework, learn what ITIL is all about, how it works, and more. Access it here.

    Download

  • 12 ways to prevent human error in your data center

    Inside this 43-page guide, read through the 12 elements that comprise a balanced and airtight facility management program. From emergency response to personnel management – and everything in between – get tactical advice on the key components that every O&M agenda should contain.

    Download

  • Getting DLP Right: 4 Elements of a Successful DLP Program

    Many organizations struggle to develop an effective data loss prevention program, viewing success as unattainable. Access this Gartner® report to learn how to turn your focus on business objectives, identify data risk factors, decrease DLP violations and address areas of stakeholder frustration.

    Download

  • DRaas and the key decision points in DR-as-a-service

    In this e-guide we look at the key decisions you'll need to make about the blend of DRaas your organisation wants, which of the key cloud providers are best for which elements of DR service delivery, the pros and cons of moving elements of disaster recovery to the cloud and which to keep closer to home, and the 12 key steps to DRaas deployment.

    Download

  • DRaas and the key decision points in DR-as-a-service

    In this e-guide we look at the key decisions you'll need to make about the blend of DRaas your organisation wants, which of the key cloud providers are best for which elements of DR service delivery, the pros and cons of moving elements of disaster recovery to the cloud and which to keep closer to home, and the 12 key steps to DRaas deployment.

    Download

  • Guide: The Minimum Elements for a Software Bill of Materials (SBOM)

    In July 2021, the NTIA published an important document, The Minimum Elements for a Software Bill of Materials (SBOM), to enable the basic use cases for SBOM usage and begin the conversation on future required SBOM elements and features. Access this guide to learn how you can go beyond the minimal requirements for SBOMs.

    Download

  • A Computer Weekly buyer's guide to network upgrades for cloud-native infrastructure

    With enterprises increasingly turning to digitisation and cloud computing, there is renewed interest in networking and a greater need for agility. In this 15-page buyer's guide, Computer Weekly looks at what IT decision-makers should be thinking about in their adoption of cloud-native applications.

    Download

  • A Computer Weekly buyer's guide to video conferencing and collaboration

    In this 17-page buyer's guide, Computer Weekly looks at how employers can support a future of flexible working, with video conferencing, collaboration, augmented reality and unified comms technologies all lined up to play a part.

    Download

  • 20 pages: Managed IT services buyer’s guide

    The value that managed IT services ultimately deliver can vary significantly from provider to provider. Save a copy of this 20-page eBook to access an in-depth overview of managed IT services and to learn what attributes to look for in potential providers.

    Download

  • A Computer Weekly buyer's guide to communications as a service

    As communications needs evolve, organisations must keep pace with the latest services available. In this 15-page buyer's guide, Computer Weekly looks at how we arrived at current-day comms systems, the growing popularity of CPaaS and the advantages of cloud-based offerings in the new normal of hybrid working.

    Download

  • Dell Precision Workstations vs. Apple MacBook Pro: Who will come out on top?

    In this resource, follow along as Dell Precisions Workstations goes head-to-head with Apple MacBook Pro, comparing features, hardware, accessories and more. Which has the best features for your creative staff? Complete this quick survey on your PC hardware challenges to find out.

    Download

  • What will a quantum datacentre look like?

    IBM has updated its quantum computing roadmap to reflect how quantum processors, central processing units (CPUs) and graphics processing units (GPUs) will be woven into a compute fabric capable of solving computationally complex problems. Understand why this impacts both hardware installation and software.

    Download

  • A Computer Weekly buyer's guide to modern software development practices

    The software development landscape is forever changing. In this 15-page buyer's guide, Computer Weekly looks at what it means to be a modern software developer, what's driving their innovation and how artificial intelligence can help build applications that make customers happy.

    Download

  • A Computer Weekly buyer's guide to modern software development practices

    The software development landscape is forever changing. In this 15-page buyer's guide, Computer Weekly looks at what it means to be a modern software developer, what's driving their innovation and how artificial intelligence can help build applications that make customers happy.

    Download

  • SCYLD CLOUD WORKSTATIONREMOTE DESKTOP FOR ACCESSING CRITICAL RESOURCESFROM ANYWHERE

    A remote desktop solution that manages multi-monitor high resolution graphics effectively can be difficult to find. Read on to learn how Penguin Computing’s Scyld Cloud Workstation does this and more, including offering hardware agnostic and expansive OS support, remote collaboration on shared desktops, and strong security features.

    Download

  • Infographic: 2019 Europe IT Priorities - Security

    In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

    Download

  • IoT is trending toward the edge

    By 2022, 75% of data is expected to be processed at the edge. With data-driven technologies changing businesses at rapid speeds, this extensive 42-page guide is here to help you define and advance a clear business-driven IoT edge strategy.

    Download

  • The Third Wave of Cloud Networks: Mutli-Cloud Networking Market Growth Drivers

    In order to meet the needs for digital transformation, automaton and remote work, multi-cloud and hybrid cloud strategies have emerged as key elements of IT strategy. This F5 report provides a closer look at the multi-cloud networking (MCN) market, highlighting trends, drivers, emerging players and more. Read on to get started.

    Download

  • 9 elements of successful sales calls

    What separates top performing reps from everyone else are the practices they use during sales calls. There are very specific techniques and behaviors used that increase their chances of a win on every call. Read on for 9 secret elements of highly effective sales conversations.

    Download

  • A Computer Weekly buyer's guide to cloud-native architectures

    Cloud-native architectures are seen as the future for businesses. In this 16-page buyer's guide, Computer Weekly looks at the influence of DevOps and microservices-based technology, the continued importance of security in containers for software development and the suitability of Microsoft Azure for deploying cloud-native applications

    Download

  • Infographic: 2019 Europe IT Priorities - Datacentre

    In this infographic, we take a look at what technological elements of the datacentre are expected to be the most important in 2019, the most popular datacentre projects and which technologies and services are being deployed. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

    Download

  • Technology scouting platforms: What are they?

    Technology scouting is an element of technology management that identifies emerging technologies, channels this information into an organization, and then supports the acquisition of technologies. Open this paper to take a look at Ezassi’s technology scouting platform, covering capabilities, use cases, services, and more.

    Download

  • 58-page eBook: Strategy patterns for innovation

    Cloud Native patterns are proven steps that organizations can combine to design a successful Cloud Native transformation – one that helps companies constantly innovate and deliver greater value to their customers. Download this 58-page eBook to learn more about those patterns and how to utilize them in your organization.

    Download

  • Security Think Tank: Critical National Infrastructure

    We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.

    Download

  • Security Think Tank: Critical National Infrastructure

    We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.

    Download

  • Your application journey: Top 3 considerations

    This checklist is here to help you wade through the murky waters of securing your application journeys. Read on for the top 3 considerations to think about when developing a strategic roadmap.

    Download

  • Converged infrastructure fundamentals

    Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive. The day of converged infrastructures has arrived.

    Download

  • Converged infrastructure fundamentals

    Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive. The day of converged infrastructures has arrived.

    Download

  • RSA Conference 2020 guide: Highlighting security's human element

    The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.

    Download

  • Backup deduplication: a complete guide

    There are many elements to consider in picking the backup deduplication technology that fits best. How do zone-level and block-level deduplication compare? What about inline versus post-processing deduplication? What are the differences between deduplication and compression? Check out this complete e-guide to backup deduplication.

    Download

  • Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated

    This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.

    Download

  • Real-time analytics possible fuel for post Covid pandemic growth

    Real-time analytics promises the last word in business agility. There is obvious business value in being able to react immediately to changing patterns in customer behaviour or to prevent problems ahead of time, to give but two examples. And becoming more real-time could be an element in accelerating economic growth beyond the pandemic.

    Download

  • Real-time analytics possible fuel for post Covid pandemic growth

    Real-time analytics promises the last word in business agility. There is obvious business value in being able to react immediately to changing patterns in customer behaviour or to prevent problems ahead of time, to give but two examples. And becoming more real-time could be an element in accelerating economic growth beyond the pandemic.

    Download

  • Connecting the supply chain nervous system with TIBCO

    COVID-19 is driving many organizations to re-evaluate their supply chain strategies and look for opportunities to improve resiliency, flexibility and scalability. Watch this video to see how TIBCO can help you re-invigorate your supply chain to improve those 3 elements, and much more.

    Download

  • Penetration testing: Identifying ineffective security controls for healthcare

    For healthcare organizations, patient records are high value targets for criminals focused on identity theft and insurance fraud. Access this white paper to learn how the NodeZero platform offers autonomous penetration testing examines your defenses as an attacker would by identifying ineffective security controls, linking weaknesses and more.

    Download