You've requested...

Download this next:

CW Benelux ezine August 2016

The Dutch are renowned for being creative with technology and the country has a deep history in art, boasting some of the most celebrated painters for example. It is therefore apt that the combined tech brains of ING, Microsoft the Technical University of Delft and other contributors created The Next Rembrandt, which is a visual showcase for big data.

The new portrait in the style of Rembrandt van Rijn was put together by a combination of big data technology and 3D printing. All of Rembrandt’s 346 paintings were analysed with data analytics making possible to create a seemingly genuine Rembrandt image, while a 3D printer made accurate emulation of his paint patterns a reality.

Also in the Netherlands we feature a case study about how The Hague is solving a bike parking headache with a mobile app.

These are also closely related to: "HTML5: Painting with Canvas"

  • What is generative AI? Everything you need to know

    Recent advances in large language models (LLMs) have opened a new era in which generative AI (gen AI) models can write engaging text, paint photorealistic images, and even create somewhat entertaining sitcoms on the fly. But despite these breakthroughs, gen AI is still in the early phases of creating readable text and stylized graphics.

    Still, the progress so far is encouraging, and many organizations believe in gen AI’s potential to fundamentally change enterprise technology and how businesses operate.

    In this e-guide, you’ll gain a deeper understanding of gen AI and discover:

    • How it works
    • Key use cases
    • Benefits & limitations
    • And more

    Read on to learn how gen AI is shaping the modern business landscape.

  • Total Cost of Ownership: UCaaS vs. On-Premise UC

    A typical TCO analysis comparing UCaaS and on-premise UC only focuses on monthly recurring costs (UCaaS) versus upfront capital and maintenance costs (on-prem) – which paints only a partial picture.

    Access this resource to know what a complete TCO analysis of UCaaS vs. on-prem UC should entail, including:

    • Data center costs
    • IT staff costs
    • OpEx vs. CapEx
    • And more

Find more content like what you just read:

  • Security leader

    89% of security professionals believe that AI-powered threats will continue to trouble their organizations well into the future. This white paper presents a brief summary of Darktrace’s recent report, including key metrics that paint a picture of the state of AI in cybersecurity. Read on to learn more.

    Download

  • DevSecOps delivers better business

    Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.

    Download

  • March ezine: Making tracks to SD-WAN growth

    SD-WAN is a technology on the rise and there are clearly plenty of channel opportunities out there for those that get a firm grip on deployment and installation

    Download

  • CW ANZ: Fix the weak links

    In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.

    Download

  • CW ASEAN: Defend against disruption

    In this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.

    Download

  • Brief guide to SASE: Key elements & more

    In this brief guide, discover how secure access service edge (SASE) can help you unify cybersecurity for your hybrid workforce.

    Download

  • Quick guide to edge computing for IoT

    By 2025 approximately 45% of the world’s data will be moved closer to the network edge, a global survey predicts. So, how can you facilitate connectivity at the edge to prepare for that shift? Unlock insights in this white paper.

    Download

  • How to elevate your content with compelling storytelling

    To create compelling content, marketers must tell their brand stories effectively and creatively. The best B2B storytellers employ narrative and graphic techniques that emotionally appeal to buyers and inspire long-lasting waves of engagement. Watch this webinar to learn more.

    Download

  • Does your webinar brand resonate with buyers?

    From landing pages to email promotions, learn how to develop a strong webinar brand that helps share your message and builds excitement across your audience.

    Download

  • DRaas and the key decision points in DR-as-a-service

    In this e-guide we look at the key decisions you'll need to make about the blend of DRaas your organisation wants, which of the key cloud providers are best for which elements of DR service delivery, the pros and cons of moving elements of disaster recovery to the cloud and which to keep closer to home, and the 12 key steps to DRaas deployment.

    Download

  • 17-page e-book: How to sell managed network services

    From selecting prospects to closing deals, discover guidance for selling managed network services in this 17-page e-book.

    Download

  • 3 Critical Elements to a Successful Mobile Strategy

    Download this eBook to discover the top 3 elements you should consider when designing the right mobile strategy for your hospital or health system.

    Download

  • Build a better webinar: Storytelling & scripting

    The best webinars tell a clear and concise story that captures an audience’s attention. You may be a seasoned presenter, but do you use the elements of good story telling to connect emotionally with your audience? Watch this webinar to learn more.

    Download

  • What will a quantum datacentre look like?

    IBM has updated its quantum computing roadmap to reflect how quantum processors, central processing units (CPUs) and graphics processing units (GPUs) will be woven into a compute fabric capable of solving computationally complex problems. Understand why this impacts both hardware installation and software.

    Download

  • A Computer Weekly buyer's guide to network upgrades for cloud-native infrastructure

    With enterprises increasingly turning to digitisation and cloud computing, there is renewed interest in networking and a greater need for agility. In this 15-page buyer's guide, Computer Weekly looks at what IT decision-makers should be thinking about in their adoption of cloud-native applications.

    Download

  • A Computer Weekly buyer's guide to video conferencing and collaboration

    In this 17-page buyer's guide, Computer Weekly looks at how employers can support a future of flexible working, with video conferencing, collaboration, augmented reality and unified comms technologies all lined up to play a part.

    Download

  • A Computer Weekly buyer's guide to communications as a service

    As communications needs evolve, organisations must keep pace with the latest services available. In this 15-page buyer's guide, Computer Weekly looks at how we arrived at current-day comms systems, the growing popularity of CPaaS and the advantages of cloud-based offerings in the new normal of hybrid working.

    Download

  • Infographic: 2019 Europe IT Priorities - Security

    In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

    Download

  • 7 risk mitigation strategies to protect business operations

    Risk mitigation strategies must not only identify risks and threats, but also stress the importance of identifying vulnerabilities that could open the door to risk events. In this infographic, we put together the seven most widely used risk mitigation strategies with to help business keep their data safe.

    Download

  • Are your identity security practices keeping up?

    According to a recent report, in 2022 74% of breaches involved a human element, including stolen credentials and other identity-related resources. Download this infographic to unlock 5 questions that help you choose the right identity security solution.

    Download

  • A Computer Weekly buyer's guide to modern software development practices

    The software development landscape is forever changing. In this 15-page buyer's guide, Computer Weekly looks at what it means to be a modern software developer, what's driving their innovation and how artificial intelligence can help build applications that make customers happy.

    Download

  • A Computer Weekly buyer's guide to modern software development practices

    The software development landscape is forever changing. In this 15-page buyer's guide, Computer Weekly looks at what it means to be a modern software developer, what's driving their innovation and how artificial intelligence can help build applications that make customers happy.

    Download

  • Infographic: 2019 Europe IT Priorities - Datacentre

    In this infographic, we take a look at what technological elements of the datacentre are expected to be the most important in 2019, the most popular datacentre projects and which technologies and services are being deployed. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

    Download

  • Security Think Tank: Critical National Infrastructure

    We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.

    Download

  • A Computer Weekly buyer's guide to customer and employee experience management

    Businesses are facing new challenges to meet the expectations of customers and employees. In this 14-page buyer's guide, Computer Weekly looks at the benefits of the experience economy, the customer service implications of always-on mobile users and how digital platforms can engage customers across all channels.

    Download

  • Converged infrastructure fundamentals

    Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive. The day of converged infrastructures has arrived.

    Download

  • Converged infrastructure fundamentals

    Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive. The day of converged infrastructures has arrived.

    Download

  • RSA Conference 2020 guide: Highlighting security's human element

    The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.

    Download

  • Backup deduplication: a complete guide

    There are many elements to consider in picking the backup deduplication technology that fits best. How do zone-level and block-level deduplication compare? What about inline versus post-processing deduplication? What are the differences between deduplication and compression? Check out this complete e-guide to backup deduplication.

    Download

  • Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated

    This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.

    Download

  • Is your infrastructure orchestration platform secure?

    Because infrastructure orchestration platforms have access to data and configurations throughout a network, organizations must ensure that these platforms are secure. To learn about four key security components of such a platform, take a look through this overview.

    Download

  • Real-time analytics possible fuel for post Covid pandemic growth

    Real-time analytics promises the last word in business agility. There is obvious business value in being able to react immediately to changing patterns in customer behaviour or to prevent problems ahead of time, to give but two examples. And becoming more real-time could be an element in accelerating economic growth beyond the pandemic.

    Download

  • Computer Weekly – 17 January 2023: How PepsiCo works with tech startups to drive growth

    In this week's Computer Weekly, we talk to food and drinks giant PepsiCo, about how it works with tech startups to drive growth and digital transformation. Our latest buyer's guide examines the key elements of a composable business. And with all the chatter about ChatGPT, we look at the implications of generative AI. Read the issue now.

    Download

  • Why less than 10% of organizations are aligned

    In this solution brief, get an overview of recent investments in visibility and control across Atlassian Administration, and how Cloud Enterprise offers advanced functionality for admins to keep their growing organizations ahead of the curve.

    Download

  • Enhancing database security with Zero Trust

    Browse this white paper to discover why and how to apply Zero Trust to your business’s database security.

    Download

  • Enterprise IoT: Edge Computing Buyers’ Guide

    To support their bandwidth-intensive IoT technologies, many organizations have turned to edge computing. Is your business considering doing the same? Check out this buyer’s guide.

    Download

  • Supporting sustainability efforts with AI and data

    Not only are government and public agencies pursuing their sustainability objectives – they’re often also responding to and predicting climate events. To find out how data and AI can support agencies’ sustainability work, check out this white paper.

    Download

  • A Computer Weekly buyer's guide to cloud-native architectures

    Cloud-native architectures are seen as the future for businesses. In this 16-page buyer's guide, Computer Weekly looks at the influence of DevOps and microservices-based technology, the continued importance of security in containers for software development and the suitability of Microsoft Azure for deploying cloud-native applications

    Download

  • How Brexit will affect your security online

    In this week's Computer Weekly, DevOps is cited as a key element of digital transformation – we examine the challenges to delivering on its promise. Many retailers are investing in emerging technologies to gain an edge – but are they too far ahead of the curve? And could a new spirit of collaboration help UK broadband roll-out? Read the issue now.

    Download

  • 44-page e-book: CPaaS trends in 2024

    By 2025, Gartner predicts, 95% of global enterprises will leverage API-enabled CPaaS (communication platform as a service) offerings. With the prevalence of CPaaS in mind, what trends should you expect in the CPaaS landscape throughout 2024? Find out in this e-book, “Scaling Communications: CPaaS and Global Expansion.”

    Download

  • How to think cloud-native

    We are still in the infancy of cloud-native in the wider IT world. Which leads to questions like, what is cloud-native, how do you implement it, and what benefits can it truly bring you? This white paper answers all these questions and more, touching on cloud-native elements like DevOps, containers, microservices, and security. Read it here.

    Download

  • Computer Weekly – 9 May 2017: Casting the IT skills net wider

    In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.

    Download

  • Understanding the modern EDR market: Buyer's guide & more

    To understand the four elements of modern endpoint detection and response (EDR) and how to find a solution that can deliver them, take a look through this buyer’s guide.

    Download

  • A complete guide to video conferencing enabled room design

    There are a variety of elements that go into conference room design, especially when adding in solutions for video conferencing. Access this blog to help you break down the components needed to put your conference room together and make it functional.

    Download

  • Augmented analytics tools: a complete guide

    Augmented analytics tools are designed to simplify the BI and analytics process for business users and citizen data scientists. They've become featured elements in new software releases from BI vendors. This e-guide offers insights into the technology's potential uses and critical issues.

    Download

  • Project Portfolio Management 101

    As your business adopts new technologies and processes to stand out in the evolving marketplace, ensuring strong project portfolio management (PPM) becomes crucial. Check out this white paper for a PPM deep dive.

    Download

  • Complement SASE with an MSP and a network connectivity supplier

    When you’re selecting SASE technology for your business, consider leveraging these partners to enable SASE success: a managed service provider (MSP) and a network connectivity supplier. Why? Check out this white paper to understand the benefits of such partners.

    Download