Vertical Industries  >  

Minerals Industry

RSS Feed   
Minerals Industry Reports
 
Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 25 Jan 2021 | Published: 26 Jan 2021

ComputerWeekly.com

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

ComputerWeekly.com

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Oracle Data Mining 11g Release 2 Mining Star Schemas: A Telco Churn Case Study
sponsored by Oracle Corporation
WHITE PAPER: This paper, based on the CACS and intended for users of the Oracle Data Miner, highlights the telco churn case study using Oracle Data Miner and explains the case study workflow methodology. Read this now and learn about preparing a database scheme and importing a pre-made Oracle Data Miner workflow.
Posted: 03 Jul 2012 | Published: 24 Jun 2012

Oracle Corporation

Benefits of Predictive Analytics for the Manufacturing Industry
sponsored by IBM
EGUIDE: The manufacturing industry has not yet taken full advantage of the ways predictive analytics can improve the supply chain. This expert e-guide dives into the benefits that manufacturers can experience with predictive analytics, especially when used in combination with sensor data from the Internet of Things.
Posted: 11 May 2016 | Published: 06 May 2016

IBM

This is what we die for
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This investigation by Amnesty International examines human rights abuses in the extraction of cobolt and the extent to which manufacturers have conducted due diligence in sourcing cobolt for mobile phone production.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

ComputerWeekly.com

Koch Industries Deploys Alkira For Their Cloud Networking Journey
sponsored by Alkira
CASE STUDY: Koch Industries is one of America’s largest privately held companies. To prepare itself for a knowledge-based economy, Koch planned to implement a global SD-WAN – followed by a multi-cloud infrastructure. Download this case study to learn how Alkira’s Network Cloud gave Koch the backbone they needed to pull off such a transformation.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

TOPICS:  .NET
Alkira

Big Data and Analytics Applied to Oil and Gas
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Companies that leverage data to optimise business processes will not only survive, but thrive during market downturns, and dominate the industry on the next upswing, this report from Quorum argues.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

ComputerWeekly.com

A Computer Weekly buyer’s guide to blockchain technology
sponsored by ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

ComputerWeekly.com

A Computer Weekly buyer's guide to blockchain technology
sponsored by ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

ComputerWeekly.com

The Current State of Blockchain Compliance
sponsored by BAE Systems Applied Intelligence
EGUIDE: In this expert e-guide, we examine blockchains and how they're affecting digital enterprise assets and cybersecurity. Discover how these distributed ledgers relate to Bitcoin and data security. Plus, learn how blockchain innovation and apps like smart contracts are affecting compliance.
Posted: 01 Mar 2017 | Published: 24 Feb 2017


Cryptojacking Emerging as a New Threat to Healthcare
sponsored by Cisco Umbrella
EGUIDE: With the increasing trend of cryptojacking, organizations must take action against attackers looking to take advantage of their environment. Discover which appropriate steps you can take to fight cybercrime today.
Posted: 27 Aug 2018 | Published: 31 Jul 2018

Cisco Umbrella

Data Analytics Maps Positive Customer Journeys
sponsored by SearchCRM
EBOOK: Amid the noise of multiple communication channels, data analytics strategies can identify needs, predict behavior and enhance the customer experience.
Posted: 28 Sep 2016 | Published: 26 Sep 2016

SearchCRM

Inventa for Hospitality
sponsored by 1Touch.io
DATA SHEET: Learn why businesses in the hospitality industry are using 1touch.io’s Inventa Platform, an AI-based data discovery platform that automatically detects and classifies any data types, regardless if it’s structured or unstructured.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

TOPICS:  Security
1Touch.io

Cryptojacking Attacks May Not Challenge Ransomware Dominance
sponsored by Cisco Umbrella
EGUIDE: Cryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.
Posted: 28 Aug 2018 | Published: 12 Apr 2018

Cisco Umbrella

Business Information E-zine Vol. 3.4: The Importance of Keeping Data Connected
sponsored by SearchDataManagement
EZINE: Data isolation followed applications into the cloud. Any company that values their data should seek a way out. If applications can't share data, companies become disconnected. In this issue of Business Information, learn why it's essential for companies to integrate their disparate business and IT systems to make the most of their investments.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

SearchDataManagement

A Guide to Navigating the Modern Health IT Infrastructure
sponsored by Cisco Umbrella
EGUIDE: Ransomware is one of the most common attacks used to hold data hostage, especially in healthcare, and that helped increase the use of digital currencies like Bitcoin. In this e-guide, learn how to defend against threats like ransomware and cryptojacking and how deception technology can help.
Posted: 14 Feb 2020 | Published: 11 Feb 2020

Cisco Umbrella

VNAs March Toward Clinical System Integration
sponsored by SearchHealthIT.com
EZINE: This issue of SearchHealthIT's Pulse zeroes in on vendor neutral archives (VNAs), and how they must integrate with EHRs and related applications to become true clinical archives.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

SearchHealthIT.com

Computer Weekly - 5 May 2020: The role of AI in the war against pandemics
sponsored by ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we look at how AI and data science are supporting the global push to deal with the coronavirus pandemic. We reveal, and talk to, the man behind the world's first computer virus pandemic, the Love Bug. And we examine how the IT services market will change as a result of the current crisis. Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

ComputerWeekly.com

Computer Weekly - 5 May 2020: The role of AI in the war against pandemics
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how AI and data science are supporting the global push to deal with the coronavirus pandemic. We reveal, and talk to, the man behind the world's first computer virus pandemic, the Love Bug. And we examine how the IT services market will change as a result of the current crisis. Read the issue now.
Posted: 04 May 2020 | Published: 05 May 2020

ComputerWeekly.com

Computer Weekly – 18 September 2018: The importance of smartphone sustainability
sponsored by Oracle Cloud
EZINE: In this week's Computer Weekly, we examine the considerable environmental footprint of the mobile phone industry and ask what can be done to improve it. We find out how disaster recovery as a service (DRaaS) is being used and when it's an option for businesses. And we look at some of the UK's emerging fintech success stories. Read the issue now.
Posted: 14 Sep 2018 | Published: 14 Sep 2018

Oracle Cloud

Aerospace and Defense 2021: Security and Operational Resilience in a World Transformed
sponsored by Interos
WHITE PAPER: 2020 broke records in the number of cyberattacks reported. In fact, 57% of organizations suffered from a cyber breach in their supply chain in the past 12 months. Learn how to protect and regulate both your supply chain and your organization in this new guide.
Posted: 17 Mar 2021 | Published: 17 Mar 2021

Interos

Information Security ANZ March 2016
sponsored by TechTarget ANZ
EZINE: Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly
Posted: 03 Mar 2016 | Published: 03 Mar 2016


Observations from the Front Lines of Threat Hunting
sponsored by CrowdStrike
WHITE PAPER: This report provides a summary of OverWatch's findings from intrusion hunting during the first half of 2018. It reviews intrusion trends during that time frame, provides insights into the current landscape of adversary tactics and delivers highlights of notable intrusions OverWatch identified. Read on to learn more.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

CrowdStrike

Modern Infrastructure – October 2014
sponsored by SearchDataCenter.com
EZINE: Liquid immersion cooling promises efficiency and cost savings, but could be messy and require major overhauls.
Posted: 14 Oct 2014 | Published: 15 Oct 2014

SearchDataCenter.com

Information Security: Companies Aren't the Only Ones Migrating to Cloud
sponsored by SearchSecurity.com
EZINE: Hackers are embracing all advantages of the cloud, launching lucrative attacks like malicious cryptomining, DDoS, and ransomware. In this issue of Information Security magazine, editor Kathleen Richards looks at cloud security in 2018 and reveals strategies to protect sensitive data from new internal and external threats.
Posted: 03 Apr 2018 | Published: 03 Apr 2018

SearchSecurity.com

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
sponsored by Barracuda
WHITE PAPER: Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
Posted: 28 May 2019 | Published: 30 Apr 2018

Barracuda

CW Benelux February 2018
sponsored by ComputerWeekly.com
EZINE: In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences