ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=10start=10start=10start=10start=30start=30"

  • CW EMEA - January 2023: Protecting the privacy of schoolchildren

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.

  • Computer Weekly - 2 November 2021: What the Budget means for UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look through the chancellor's Autumn Budget and Spending Review to find what it means for the UK tech sector. As COP26 starts, we assess the green credentials of the IT industry. And we hear one CTO's experiences of learning the privacy lessons of GDPR. Read the issue now.

  • Manage and Secure your Most Vulnerable Endpoints: Mobile Devices

    Sponsored by: JAMF

    Between digital business and remote work, millions of users worldwide rely on smartphones and tablets devices to accomplish their work on a daily basis. But this convenience comes with a cost and has introduced risk and vulnerability. Read this white paper to learn more about the state of mobile security.

  • Computer Weekly: Data Danger

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?

  • 10 Steps to Enhance the Agility, Security and Performance of Active Directory

    Sponsored by: One Identity

    Microsoft Active Directory (AD) and Azure AD (AAD) bring organization and standards to how identity and account data is managed and stored. One Identity Active Roles unifies your AD and AAD environments and enables identity and account data to be managed with agility, security and speed. Read on to learn more.

  • Cloud Security Your Developers Will Love

    Sponsored by: CyberArk

    As organizations move to the cloud, they seek consistent, developer-friendly controls that secure their access to cloud-based workloads and SaaS applications without slowing their productivity down. Access this e-book to learn more.

  • How Fleet Management Can Improve Your Bottom Line

    Sponsored by: T-Mobile for Business

    In this e-book, uncover the 6 key areas where smarter, integrated fleet management technology can help you tackle your challenges head on.

  • How to Implement an OSS Governance Program

    Sponsored by: Anaconda

    Just like all software, open-source carries risk, and many data science teams still lack security protocols. For some, there simply aren’t security protocols or governance tools for open-source software (OSS). Read on to learn about 6 steps you can take to build an OSS governance program that works for data science and set your team up for success.

  • Leveraging Automation to Achieve DevSecOps for Secure Web Applications and APIs

    Sponsored by: Veracode, Inc.

    To find out how your teams can deliver more secure software faster, take a look through this white paper, "Leveraging Automation to Achieve DevSecOps for Secure Web Applications and APIs."

  • MicroScope – June 2022: A return to face-to-face meetings

    Sponsored by: MicroScope

    With the world emerging from the pandemic, what role does the personal event and face-to-face meetings hold in business? Also read about the next step for the future of collaboration and communication services, and why there needs to be greater diversity across the channel

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.