You've requested...

Download this next:

CW Benelux ezine August 2016

The Dutch are renowned for being creative with technology and the country has a deep history in art, boasting some of the most celebrated painters for example. It is therefore apt that the combined tech brains of ING, Microsoft the Technical University of Delft and other contributors created The Next Rembrandt, which is a visual showcase for big data.

The new portrait in the style of Rembrandt van Rijn was put together by a combination of big data technology and 3D printing. All of Rembrandt’s 346 paintings were analysed with data analytics making possible to create a seemingly genuine Rembrandt image, while a 3D printer made accurate emulation of his paint patterns a reality.

Also in the Netherlands we feature a case study about how The Hague is solving a bike parking headache with a mobile app.

These are also closely related to: "HTML5: Painting with Canvas"

  • DevSecOps delivers better business

    Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it’s time for you to find out how and why.

  • Enterprise Strategy Group (ESG): The state of zero trust

    89% of cybersecurity professionals expect their organizations’ zero-trust support spending to increase over the next 12-18 months.

    In this infographic, TechTarget’s Enterprise Strategy Group (ESG) compiles key findings from a recent study to paint a picture of the current zero-trust landscape.

    Download now for a deeper look at where organizations are finding success, and where they are meeting with challenges.

Find more content like what you just read:

  • Charting the course for IT and security: Key trends in 2024

    With new threats and technologies emerging all the time, it can be tricky for businesses to predict what the future may hold. In this webinar, experts from Cribl will analyze key trends and predictions from the previous year and use them to paint a clearer picture of what business can expect in IT and security in 2024. Tune in now to learn more.

    Download

  • March ezine: Making tracks to SD-WAN growth

    SD-WAN is a technology on the rise and there are clearly plenty of channel opportunities out there for those that get a firm grip on deployment and installation

    Download

  • CW ANZ: Fix the weak links

    In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.

    Download

  • How to elevate your content with compelling storytelling

    To create compelling content, marketers must tell their brand stories effectively and creatively. The best B2B storytellers employ narrative and graphic techniques that emotionally appeal to buyers and inspire long-lasting waves of engagement. Watch this webinar to learn more.

    Download

  • Brief Guide to SASE: Key Elements & More

    In this brief guide, discover how secure access service edge (SASE) can help you unify cybersecurity for your hybrid workforce.

    Download

  • Does your webinar brand resonate with buyers?

    From landing pages to email promotions, learn how to develop a strong webinar brand that helps share your message and builds excitement across your audience.

    Download

  • Quick guide to edge computing for IoT

    By 2025 approximately 45% of the world’s data will be moved closer to the network edge, a global survey predicts. So, how can you facilitate connectivity at the edge to prepare for that shift? Unlock insights in this white paper.

    Download

  • CW ASEAN: Defend against disruption

    In this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.

    Download

  • MSSPs: 17-point checklist for success

    In a crowded landscape, how can a Managed Security Service Provider (MSSP) stand out and boost sales? With the right people, processes and tools, this white paper argues. To access a 17-point checklist for MSSP success, continue on.

    Download

  • 2024 Data Breach Investigations Report: Key findings

    The "2024 Data Breach Investigations Report" from Verizon examines the latest cybercrime trends, including the growing use of vulnerabilities and evolving ransomware techniques. Learn about threats facing different industries and regions by reading the full report.

    Download

  • DRaas and the key decision points in DR-as-a-service

    In this e-guide we look at the key decisions you'll need to make about the blend of DRaas your organisation wants, which of the key cloud providers are best for which elements of DR service delivery, the pros and cons of moving elements of disaster recovery to the cloud and which to keep closer to home, and the 12 key steps to DRaas deployment.

    Download

  • Why good design is good for business

    A good graphic design strategy is pivotal in defining your brand's identity and influences how people perceive and trust your brand, ultimately impacting customer spending. Have you considered how the right design strategy can transform your brand's image and drive substantial business growth? Tune into this webinar to learn more.

    Download

  • Explore the latest breakthroughs in HPC, AI, and quantum computing

    Accelerate scientific discovery with Azure Quantum Elements, which provides HPC, AI, and quantum computing capabilities to transform government R&D. Achieve 30,000x faster candidate searches, 500,000x modeling acceleration, and 6 months to 1 week project completion. Read the full product overview to learn how.

    Download

  • 3 Critical Elements to a Successful Mobile Strategy

    Download this eBook to discover the top 3 elements you should consider when designing the right mobile strategy for your hospital or health system.

    Download

  • Build a better webinar: Storytelling & scripting

    The best webinars tell a clear and concise story that captures an audience’s attention. You may be a seasoned presenter, but do you use the elements of good story telling to connect emotionally with your audience? Watch this webinar to learn more.

    Download

  • What will a quantum datacentre look like?

    IBM has updated its quantum computing roadmap to reflect how quantum processors, central processing units (CPUs) and graphics processing units (GPUs) will be woven into a compute fabric capable of solving computationally complex problems. Understand why this impacts both hardware installation and software.

    Download

  • A Computer Weekly buyer's guide to Computational storage & persistent memory

    Companies are finding that computational storage can solve the data bottleneck. In this 14-page buyer's guide, Computer Weekly takes a closer look at its benefits, how it can be used and the advantages of faster computing.

    Download

  • Infographic: 2019 Europe IT Priorities - Security

    In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

    Download

  • 7 risk mitigation strategies to protect business operations

    Risk mitigation strategies must not only identify risks and threats, but also stress the importance of identifying vulnerabilities that could open the door to risk events. In this infographic, we put together the seven most widely used risk mitigation strategies with to help business keep their data safe.

    Download

  • Change platforms: Key to reducing costs & increasing time to value

    Bosch embarked on a major Salesforce transformation to shift from a product-centric to a software-centric enterprise. Using Elements.cloud's Change Intelligence Platform, Bosch streamlined their implementation process, reduced costs, and accelerated time to value. Read the full case study to learn how.

    Download

  • Are your identity security practices keeping up?

    According to a recent report, in 2022 74% of breaches involved a human element, including stolen credentials and other identity-related resources. Download this infographic to unlock 5 questions that help you choose the right identity security solution.

    Download

  • AI, HPC lead the way for materials innovation

    This white paper explores how AI and HPC can accelerate materials innovation for sustainable energy and healthcare solutions. It showcases how Microsoft and PNNL used AI to discover a new battery material in under 9 months. Learn more about Azure Quantum Elements and how it can transform your R&D approach.

    Download

  • Infographic: 2019 Europe IT Priorities - Datacentre

    In this infographic, we take a look at what technological elements of the datacentre are expected to be the most important in 2019, the most popular datacentre projects and which technologies and services are being deployed. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

    Download

  • A Computer Weekly Buyer's Guide to Containers and Microservices

    In this 13-page buyer's guide, Computer Weekly looks at how the architectures are configured, the suppliers building them – and the benefits to the organisation using them.

    Download

  • Security Think Tank: Critical National Infrastructure

    We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.

    Download

  • Data modeling guide

    This document describes core elements you will use to model and handle data in Couchbase CapellaTM (or Couchbase Server). It describes the ways you can structure individual JSON documents for your application, how to store the documents with a Couchbase SDK, and different approaches you may take when you structure data in documents.

    Download

  • AI, HPC, and quantum: Top use cases in R&D

    Discover how Azure Quantum Elements can accelerate scientific innovation by combining high-performance computing, AI, and quantum capabilities. Explore new frontiers in materials science, chemistry, and more. Read on to learn more about the Azure Quantum Elements private preview.

    Download

  • Converged infrastructure fundamentals

    Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive. The day of converged infrastructures has arrived.

    Download

  • Converged infrastructure fundamentals

    Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive. The day of converged infrastructures has arrived.

    Download

  • RSA Conference 2020 guide: Highlighting security's human element

    The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.

    Download

  • Backup deduplication: a complete guide

    There are many elements to consider in picking the backup deduplication technology that fits best. How do zone-level and block-level deduplication compare? What about inline versus post-processing deduplication? What are the differences between deduplication and compression? Check out this complete e-guide to backup deduplication.

    Download

  • Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated

    This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.

    Download

  • Real-time analytics possible fuel for post Covid pandemic growth

    Real-time analytics promises the last word in business agility. There is obvious business value in being able to react immediately to changing patterns in customer behaviour or to prevent problems ahead of time, to give but two examples. And becoming more real-time could be an element in accelerating economic growth beyond the pandemic.

    Download

  • Computer Weekly – 17 January 2023: How PepsiCo works with tech startups to drive growth

    In this week's Computer Weekly, we talk to food and drinks giant PepsiCo, about how it works with tech startups to drive growth and digital transformation. Our latest buyer's guide examines the key elements of a composable business. And with all the chatter about ChatGPT, we look at the implications of generative AI. Read the issue now.

    Download

  • Enterprise IoT: Edge Computing Buyers’ Guide

    To support their bandwidth-intensive IoT technologies, many organizations have turned to edge computing. Is your business considering doing the same? Check out this buyer’s guide.

    Download

  • Common anti-patterns of developer productivity

    There is a common, albeit strange, scenario in product development where developers want to be more productive, but they don’t feel productive, and yet their managers wish to track their productivity. Discover how to help developers be more productive, as opposed to simply tracking productivity, in this video from Atlassian.

    Download

  • How Brexit will affect your security online

    In this week's Computer Weekly, DevOps is cited as a key element of digital transformation – we examine the challenges to delivering on its promise. Many retailers are investing in emerging technologies to gain an edge – but are they too far ahead of the curve? And could a new spirit of collaboration help UK broadband roll-out? Read the issue now.

    Download

  • Augmented analytics tools: a complete guide

    Augmented analytics tools are designed to simplify the BI and analytics process for business users and citizen data scientists. They've become featured elements in new software releases from BI vendors. This e-guide offers insights into the technology's potential uses and critical issues.

    Download

  • A complete guide to video conferencing enabled room design

    There are a variety of elements that go into conference room design, especially when adding in solutions for video conferencing. Access this blog to help you break down the components needed to put your conference room together and make it functional.

    Download

  • Computer Weekly – 9 May 2017: Casting the IT skills net wider

    In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.

    Download

  • Understanding the modern EDR market: Buyer's guide & more

    To understand the four elements of modern endpoint detection and response (EDR) and how to find a solution that can deliver them, take a look through this buyer’s guide.

    Download

  • The same identity challenges, day after day

    According to a recent study, 74% of cybersecurity breaches involve the “human element”. This Cisco webcast explores the problems of today’s identity security, invoking the “Groundhog Day” feeling that many security professionals experience as they witness the same challenges day after day. Watch now to learn more.

    Download

  • Explore the potential of computer vision AI for your business

    Computer vision AI enables systems to derive insights from visual data, automating business processes. Learn how Intel's hardware and software solutions can help you deploy cost-effective, scalable computer vision applications. Read the full article to explore the details.

    Download

  • How you can help your organization run smarter & more effectively

    Discover how Insight, as a leading Lenovo partner, can help your business realize new efficiencies and cost savings with Lenovo and AMD devices. Dig into the white paper to learn how these solutions can power your workforce and drive innovation.

    Download

  • Don’t Just Plan for the Future, Emulate It

    Experience is a key element in any potential cybersecurity operation. The SimSpace platform offers a robust suite of testing capabilities designed to fortify cyber defenses by assessing and enhancing the effectiveness of your defenses, helping you overcome any gaps in experience. Download this data sheet to discover more.

    Download

  • Why you need convergence

    You need convergence today more ever.  Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive.

    Download

  • A Computer Weekly buyer's guide to Asset Management for Hybrid IT

    Hybrid IT opens up a range of new considerations for businesses. In this 14-page buyer's guide, Computer Weekly looks at how to manage its infrastructure, the importance of cost management and the main considerations to make when addressing cloud management issues.

    Download