PRESENTATION TRANSCRIPT:
Read this presentation transcript of the “Prototyping Data Warehouses using Visual Analytics” webinar that includes a case study demonstrating how the City of Charlotte is administering Tableau Server to reduce IT intervention, reduce costs and increase collaboration between business units.
TECHNICAL ARTICLE:
This article describes how game developers can use the power of CSS3 to design common game indicators, such as health, magic, ammo, money, etc.
WHITE PAPER:
This white paper discusses how mobile peripherals help extend the value of BlackBerry solutions such as automate data collection, improve accuracy, and
lower costs, among other benefits.
WHITE PAPER:
This white paper describes how KVM technology can improve system reliability, manageability, and security, resulting in lower TCO and less downtime.
WHITE PAPER:
As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
EBOOK:
To celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.
EGUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
EZINE:
Consumerisation of IT in the ASEAN regionMobile devices are being used by staff in their work environment. So much so that businesses can no longer ignore it.
EZINE:
This month's Modern Infrastructure e-zine examines how two abstraction technologies are being used together and how some open source innovators are even latching onto this best-of-both-worlds idea in an effort to better merge containers and VMs.
EZINE:
In this week's Computer Weekly, as the US ramps up semiconductor sanctions on China, we examine the ramifications across the tech sector. Cyber criminals are turning to new forms of encryption – we talk to the Dutch researchers trying to catch them. And we look at what cloud providers need to do to improve customer experience. Read the issue now.