This collection includes articles on the energy cost of an AI model and how AI can reduce waste. It targets C-suite executives who want to understand the monetary and environmental cost of AI technology.
In this week's Computer Weekly, artificial intelligence is still no match for the brain – we talk to Intel's neuromorphic computing lab to see how researchers are trying to address that. Our buyer's guide examines identity and access management. And we find out why datacentres are becoming a new target for financial investors. Read the issue now.
In this review of the top 10 Computer Weekly articles on IT in ASEAN, we look at what countries across the region are doing to drive adoption of emerging technologies such as artificial intelligence (AI) and the internet of things (IoT), raise their cyber security capabilities amid growing cyber threats, and draw more women into the IT industry.
In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at what the country is doing to improve work productivity, upgrade its supercomputing infrastructure, harness the internet of things to improve business operations and realise its space ambitions.
The right way to evaluate the quality of your system and data protection is to evaluate the Recovery Time Objective (RTO) and Recovery Point Objective (RPO). These metrics define how long you think it will take you to get back online and how current the data has to be. Read this white paper to learn more.
Small and medium businesses cannot afford to lose access for their data. Research shows that even brief server failures lead most smaller businesses to shut their doors for good. In light of this, any business should develop a workable backup and disaster recovery plan.
The latest technologies innovations provide a big, evolutionary stride in economically superior storage designed to swiftly address mounting data challenges and changing business demands. With 3D scaling and dynamic tiering, IT leaders can dynamically scale up, scale out and scale deep for increased performance and scalability.
Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.