ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=10start=10start=10start=10start=30start=30"

  • Security Threats for Apps “In the Wild”

    Sponsored by: Digital.ai

    Download this study to learn how security professionals can safeguard their apps and users from malicious activities by illuminating and quantifying the threats to applications in the wild.

  • COVID-19 in APAC:Tech industry lessons & innovations

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read about the impact of the COVID-19 outbreak on the APAC tech sector, what tech vendors in the region are doing to support organisations during this difficult period and how the pandemic could spur businesses to dial up their digitisation efforts.

  • Embracing generative AI

    Sponsored by: Virtusa

    Generative AI is reshaping the workplace, and optimism abounds for its role in enhancing productivity and innovation. This report examines how successful implementations tackle challenges in training, organizational barriers, and governance. Access the full report for details.

  • CW Benelux ezine August 2016

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of CW Benelux we describe how data scientists in the Netherlands have applied technology to art.

  • Get More Done With Fewer Meetings

    Sponsored by: Atlassian

    Learn how to reclaim your calendar and focus with simple asynchronous work habits. Discover strategies to reduce unnecessary meetings, provide feedback effectively, and boost team collaboration. Read the full white paper to transform your workday.

  • Computer Weekly – 14 August 2018: Infrastructure under attack

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.

  • Computer Weekly – 16 January 2024: All eyes are on the Post Office scandal – at last

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, 15 years since we first revealed the plight of subpostmasters, and four years since their High Court victory, the UK public and government are getting behind the victims, thanks to a TV dramatisation of the scandal. We look at plans to quash convictions and analyse Fujitsu’s role in the scandal. Read the issue now.

  • How To Increase Patient Collections + Loyalty

    Sponsored by: Waystar

    This white paper reveals how to create a consumer-friendly experience, starting by evolving processes and empowering patients to manage their health — and bills — with less stress and surprise. Download now to explore the current state of patient collections, how to use automation in workflows, and more.

  • The Total Economic Impact of ServiceNow Strategic Portfolio Management

    Sponsored by: ServiceNow

    Strategic portfolio management (SPM) allows organizations to gather their enterprise-wide documentation into a single platform for easier access. Forrester Total Economic Impact Study looks at ServiceNow SPM, using real-world use cases and statistics to provide an accurate estimate of the economics you can expect. Read on to learn more.

  • Digital drive: The IT backbone behind Lewis Hamilton's British Grand Prix win

    Sponsored by: TechTarget ComputerWeekly.com

    Dive into the world of the Mercedes F1 IT team, where advanced data analytics, real-time telemetry, and state-of-the-art simulations come together to fine-tune every race detail. Uncover how this seamless blend of technology and teamwork gave Lewis Hamilton the edge he needed to triumph at Silverstone.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.