ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=10start=10start=10start=10start=30start=30"

  • Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.

  • A Computer Weekly buyer's guide to storage for the internet of things

    Sponsored by: TechTarget ComputerWeekly.com

    The internet of things is being used to improve storage options. In this 13-page buyer's guide, Computer Weekly looks at how the IoT could increase volumes of data, the challenges it may bring, and the role edge processing, analytics and the cloud has to play in increasing profits

  • 2024 Guide To Ai-First Digital Procurement Transformation

    Sponsored by: GEP

    Today, digital transformation has evolved past simply adopting new technologies; it’s become a necessary step to enhance your organization’s procurement processes. However, the current procurement landscape is uncertain, and many companies are hesitant to transform, especially without guidance. Browse this guide to learn more.

  • CW Nordics February 2017

    Sponsored by: TechTarget ComputerWeekly.com

    In this first issue of CW Nordics in 2017, we take a look what CIOs in the region are expecting in the year ahead. We asked a select group of CIOs and analysts in Denmark, Finland, Norway and Sweden what IT projects are at the top their priority lists.

  • Mini Guide: Is Mainframe Modernization Right for Your Organization?

    Sponsored by: Ensono Limited

    Is your business considering mainframe modernization? The time to modernize your mainframe is now. Dig into this white paper to start your modernization journey to enable cost savings, streamline operations and take advantage of new capabilities.

  • Netting Deeper ABM Engagement with Webinars

    Sponsored by: BrightTALK by TechTarget

    Access this guide to explore how effective video-based content can drive deeper engagement within target accounts. You’ll learn how to tailor webinars to maximize success and get tactics for activating Sales around webinar engagement signals, all to boost the performance of your ABM program.

  • Computer Weekly – 26 February 2019: Delving into viewer data at the BBC

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the BBC about how the UK broadcaster is using data analytics to better understand its viewers and grow its audience. We look at how CERN is using IT automation in its quest to unravel the mysteries of the universe. And we examine the impact of GDPR on cloud storage. Read the issue now.

  • The Data-Fitness Suite Spot

    Sponsored by: Hitachi Pentaho

    As data challenges grow, point solutions may not be enough. In this white paper, you'll learn how a modular data management platform can provide the scalable, integrated fitness your organization needs to stay agile. Read on now to discover the key capabilities of a data-fit solution.

  • CW Nordics - November 2020-January 2021: Bank branch closures continue as digital banking grows

    Sponsored by: TechTarget ComputerWeekly.com

    Sweden's Handelsbanken is cutting its branch network by nearly half, which means more money will be invested in IT. But it's not just Sweden and the Nordics – banks across the world are watching the fintech industry demonstrate to consumers what banking can be like if the right technology is in place.

  • Proactive Security: Software vulnerability management and beyond

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.