You've requested...

Download this next:

Artificial Intelligence and Machine Learning in data analytics and business applications

Artificial Intelligence and the sub-set of it which is machine learning are hot. It’s been impossible to attend an IT conference in the last year or so without encountering a dead human genius reincarnated as a software system or a robot.

What lies beyond the hype? In the data management field, experts tell us there are many basic things organisations can do to get more business value from their data before they over-commit to experimenting with machine learning.

And yet, as the articles in this e-guide show, there is real worth in AI/ML, and it might open up new roles and more business-central activities for IT professionals. This is suggested in the lead article here, which explores the impact AI/ML is having in the Law, and suggests parallels in other sectors. However, the potential for AI to take away, but fail to replace jobs should not be ignored, and needs to be understood and managed.

A recent McKinsey study suggests adoption of AI/ML is fairly modest outside the technology sector itself, but does indicate significant investment. And there does seem to be a concatenation of technologies – blockchain, IoT, machine learning that might, together, transform the business applications side of IT more broadly.

SAP and IBM are among the suppliers investing in artificial intelligence and machine learning. The latter is showcasing some of its Watson AI capability at Wimbledon this summer. But all the enterprise software giants are pitching in and one of the articles in this e-guide counsels against too hasty adoption of a “black box” approach”.

These are also closely related to: "Bessere Infrastrukturen dank Big Data"

  • Big Data and Analytics Applied to Oil and Gas

    Informational value is the most important commodity throughout the oil and gas industry – from upstream operators to pipelines that deliver products to world markets.

    Newly embedded devices and sensors make it easier to collect data at an ever-increasing rate; while cloud storage technologies make it simpler to store the data. However, real value is created from data when informational context and associations are made inside and outside of an organisation.

  • CW ANZ: Taming the data beast

    Software-defined storage (SDS), which promises greater transparency and control over data, is an increasingly important tool in the enterprise technology armoury. In this issue of CW ANZ, we look at how Australian enterprises are turning to SDS to improve data management and direct data to different tiers of storage or to applications.

    Also in this issue:

    Analysts query Australian government’s IBM deal after previous tech problems

    Industry analysts and experts have called into question the wisdom of the Australian government’s A$1bn IT deal with IBM, with one claiming it should have used a range of suppliers instead.

    What machine learning practitioners can learn from data warehousing

    Cloudera’s head of emerging business, Charles Zedlewski, shares lessons that machine learning practitioners can learn from their cousins in the data warehousing sector.

    'Splunking' data for APAC’s enterprises

    Splunk’s regional vice-president, Chern-Yue Boey, tells Aaron Tan about the company’s business strategy and how its customers are using big data analytics in security and IT operations.

Find more content like what you just read:

  • Clients tell-all in Linux simplification and innovation for enterprises

    In this e-book, you will discover how to optimize server reliability, uptime, and IT manageability (and meet your SLAs) using an enterprise-grade Linux platform. Read on to ensure your business receives the processing power it needs to address increasingly sophisticated and demanding application requirements.

    Download

  • Computer Weekly – 20 October 2020: Why is IBM splitting in two and what does it mean for CIOs?

    In this week's Computer Weekly, IBM is splitting in two, hiving off its services business to focus on hybrid cloud – we examine what it means for CIOs. Our new buyer's guide looks at how intelligent workload management can cut cloud complexity. And we analyse how getting backup right can help tackle ransomware threats. Read the issue now.

    Download

  • IT Project: Internet of Things

    The internet of things, or IoT, is moving from far-fetched to reality in 2016, and more and more enterprises are taking a serious look at how they can capitalise on this to improve their processes.

    Download

  • Data Protection 101: Essential Steps for Holistic Information Security

    Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This e-guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.

    Download

  • Top 10 datacentre stories of 2018

    There is nothing like a datacentre outage to highlight just how reliant the digital economy is on these facilities, with the 2018 news cycle dominated by tales of server rooms going awry and causing mass disruption to end users across the globe. Here's a look back over Computer Weekly's top 10 datacentre stories of 2018.

    Download

  • Computer Weekly - 12 April 2022: Disney combines digital, data and creativity for ad opportunities

    In this week's Computer Weekly, we talk to Disney Advertising Sales about how it is using data to subserve story-telling excellence. We delve into how rising energy costs negatively impacted the the UK arm of Sungard Availability Services. And we look at the role of infrastructure as code in edge datacentres. Read the issue now.

    Download

  • CW Buyers Guide: Green IT

    This six-page Buyer’s Guide to Green IT helps CIOs and senior IT professionals to identify the issues around going green and explains the pros and cons of using third-party facilities to run IT services.

    Download

  • CW Nordics - May-July 2019: Facing up to fintech

    In this issue of CW Nordics, we take a look at how one of the Nordic region's big, traditional banks is going about meeting the challenges posed by new digital entrants into the finance sector. And it is another large traditional player, but this time in the IT world, which Nordea is turning to for support– none other than Big Blue.

    Download

  • The Evolution of Threat Detection and Management

    This e-guide from SearchSecurity.com explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.

    Download

  • Data security: Don't make these 5 common mistakes

    Take a look through this IBM Security e-book to learn how to avoid five common data security missteps.

    Download

  • Using IT initiatives to save money and reinforce green credentials

    Analyst Group Quocirca explains how organisations can use web data caching software to save money and improve their green credentials.

    Download

  • Big data analytics & innovation in Australian healthcare

    In this e-guide, find out how healthcare providers in Australia and the rest of APAC have successfully tapped the power of data analytics and other related technologies to advance digital health and better position themselves to cope with the growing demand for healthcare.

    Download

  • Computer Weekly investigates Technology advancements in the Netherlands

    With Google planning to build a datacentre in the Netherlands &ING launching a voice-recognition banking app, we look into the the advancements the technology sector in the Netherlands is making.

    Download

  • Poland's Storage market on the rise

    Poland's storage market has been on a steady rise but what's the reason behind this? We investigate...

    Download

  • How to create an effective data protection strategy for IT compliance

    Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This tip guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.

    Download

  • How server virtualisation is evolving to cloud native environments

    In this e-guide we discover how, in recent years, server virtualisation has given businesses the ability to abstract applications and the operating system from the underlying hardware. We explore how server virtualisation is gradually evolving towards cloud native environments.

    Download

  • Computer Weekly – 26 May 2020: Can Lady Gaga and Madonna get people to take IT security seriously?

    In this week's Computer Weekly, after hackers threatened to release data from a US law firm's celebrity clients, will people finally take cyber security seriously? Designing software for older users makes systems better for all – we examine how. And the IT chief at TSB explains how the bank recovered from its 2018 IT disaster. Read the issue now.

    Download

  • MicroScope – June 2020: The surge in home working

    The shift by many to home working has created opportunities and challenges for the channel as it looks to help customers through the changes. Also discover the importance of diversity in your workforce, and how Covid-19 is affecting IT events

    Download

  • Computer Weekly - 5 April 2022: Police use of AI needs overhaul to prevent abuse

    In this week's Computer Weekly, a House of Lords inquiry calls for a rethink on how police forces use AI technologies – we examine the issues. Our new buyer's guide looks into edge datacentres. And the EU and US agree a new data protection deal to replace Privacy Shield, but will it stand up to scrutiny? Read the issue now.

    Download

  • Computer Weekly – 12 July 2016: Watson gets to work

    In this issue we explore the many ways Watson has evolved from the machine that bettered humans in Jeopardy! to providing deep analytical insights to solve real world crises. We also look at how Barclay's bank is using DevOps to remain competitive and reveal new research that illustrates why cloud computing is at the heart of business innovation.

    Download

  • Why hyper-converged infrastructure could improve overall IT performance

    In this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends.

    Download

  • Computer Weekly - 15 March 2022: How the tech sector is supporting Ukraine

    In this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.

    Download

  • Top 10 ASEAN IT stories of 2019

    Over the year, Computer Weekly looked at how the region is embracing technology, not for its own sake but to become more nimble, secure and to overcome the challenges of a growing economy. Here are Computer Weekly's top 10 ASEAN IT stories of 2019.

    Download

  • Information Security Essential Guide: The Evolution of Threat Detection and Management

    This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.

    Download

  • Understanding the modern EDR market: Buyer's guide & more

    To understand the four elements of modern endpoint detection and response (EDR) and how to find a solution that can deliver them, take a look through this buyer’s guide.

    Download

  • PHC Test sessions res

    PHC Test sessions res

    Download

  • CW Europe - September-November 2022: Why Russia could become the world's biggest market for illegal IT

    Faced with international sanctions and the departure of many global IT suppliers from Russia, companies there are seeking alternative, and sometimes illegal, routes to access IT products. Also read how new requirements are driving scientists and engineers in Europe back to the lab to start developing 6G technology.

    Download

  • Case study: Armellini Logistics experiences shadow IT's impact

    To analyze the state of attack surface management (ASM), Enterprise Strategy Group and Randori, an IBM Company, surveyed 398 IT decision-makers. Tap into this report to review the findings, which explore three forces driving organizations to adopt a more continuous approach to ASM.

    Download

  • What you need to know about DCIM tools

    The definition of data center infrastructure management (DCIM) tools varies, but the nature of these tools is to give you deeper insight into your IT infrastructure and facilities. This e-guide gives you an understanding of DCIM, how to incorporate the tools into your organization, their impact on modern data centers, and more.

    Download

  • AI in your SOC? What you need to know

    Take a look through this white paper to review seven questions to consider before adopting an AI security tool.

    Download

  • CW Nordics ezine November 2018

    Given the controversy surrounding some recent elections and fears of interference by foreign actors, it is hardly surprising that the Swedish government is seeking support from the IT sector as it attempts to guarantee elections remain trustworthy.

    Download

  • Primary storage guide for large enterprises

    As primary storage continues to evolve to fit organizations’ ever-changing needs, many enterprises are searching for solutions that can meet their expectations. However, primary storage isn’t one size fits all. So, how can you find a system that best fits your company’s needs? Browse this report to learn more.

    Download

  • A Starting Point for Your Zero-trust Journey

    So, you want to launch your journey to zero trust, but you’re wondering where to begin. This IBM paper advises to set identity and access management (IAM) as your starting point. Read on for more guidance.

    Download

  • CW Middle East - October-December 2022: Qatar strengthens cyber defences ahead of FIFA World Cup

    Being the first Arab country to host the World Cup is pressure enough on Qatar, but there is also a massive cyber security challenge associated with any event of this magnitude. Read about its preparations. Also in this issue, find out about the unique challenges of hiring IT professionals in Saudi Arabia.

    Download

  • How AI improves Predictive Maintenance

    Kone and ThyssenKrupp are using artificial intelligence to improve predictive maintenance of their lifts and escalators.

    Download

  • How AI improves Predictive Maintenance

    Kone and ThyssenKrupp are using artificial intelligence to improve predictive maintenance of their lifts and escalators.

    Download

  • Computer Weekly – 17 May 2022: Digitally transforming UK power networks for renewable energy

    In this week's Computer Weekly, we find out how the UK's power networks need to be digital transformed to be ready for renewable energy – and the role of open source. Wi-Fi 6 was meant to give a boost to wireless connectivity – we examine why adoption has stalled. And we look at what a quantum datacentre might be like. Read the issue now.

    Download

  • Computer Weekly – 24 September 2019: Climate change – the challenge for datacentres

    In this week's Computer Weekly, we examine the impact of climate change on datacentres as potential victims and contributors to the problem. We look at the rise of voice channels and how IT leaders can use the technology for better customer experience. And we ask what lessons must be learned from Ecuador's citizens' data breach. Read the issue now.

    Download

  • Powering down: Keeping datacentre energy costs in check

    In this e-guide, we take a look at some of the outside influences that could potentially impact on datacentre power and management costs in the years to come, while also taking a closer look at some of the latest thinking and best practices around datacentre energy efficiency and cooling today.

    Download

  • Computer Weekly - 8 March 2022: Using technology to protect human rights

    In this week's Computer Weekly, we investigate how technology is being used to tackle human rights abuses worldwide. We offer a step-by-step guide to disaster recovery in the cloud era. And we examine the vital, and successful, role of digital and data in the UK Covid-19 vaccine roll-out. Read the issue now.

    Download

  • Quantum computing: What are the data storage challenges?

    Quantum computing will process massive amounts of information. But, to be fully effective, quantum computing will need to access, analyse and store huge amounts of data. One area, in particular, will have to deal with significant challenges: data storage. How will today's storage systems keep pace?

    Download

  • CW Benelux - February-April 2021: Is reluctance to report cyber crimes in the Netherlands helping the criminals to get away?

    According to an academic study in the Netherlands, only one in seven Dutch people report a cyber crime to the police when it happens - feeling it is better to sort the problem out themselves because they don't think the police will do anything.

    Download

  • Security Analytics

    This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.

    Download

  • Enterprise Strategy Group report: Boosting OT cybersecurity

    Due to their lack of built-in security, OT assets – such as critical smart devices – tend to be highly susceptible to cyberattacks. In the face of increasingly complex cyberthreats, how can you level up your business’s OT cybersecurity? Unlock guidance in this Economic Validation report by TechTarget’s Enterprise Strategy Group (ESG).

    Download

  • CW Middle East ezine July 2018

    What more does a region need to be recognised as a technology leader than its very own valley, of the silicon variety? Where once only oil flowed down Saudi Arabia's economic valleys, tech has now taken a grip. Read in this issue about the country's ambitions in the tech sector.

    Download

  • Computer Weekly – 16 August 2022: Broadband reaches for the stars – the new space race

    In this week's Computer Weekly, we look at the latest space race, as satellite firms compete to provide high-speed connectivity. Is the datacentre sector hindering house building in the UK? We find out what's really going on. And we talk to the IT director of the Mercedes Formula One team about how data helps to win races. Read the issue now.

    Download

  • The Gorilla Guide to IT asset management

    Smarter approaches to asset management addresses the hidden asset cost gotchas; download this Gorilla Guide e-book to find out how.

    Download