ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=10start=10start=10start=10start=30start=30"

  • How to Have Productive Experiences for Your Employees

    Sponsored by: ServiceNow

    An organization is only as strong as its employees. Read this paper to learn how the path to delivering productive employee experiences and supporting new ways of working begins with creating exceptional experiences.

  • Chapter 1: Security and Risk Management

    Sponsored by: McGraw Hill

    In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.

  • Orion Case Study

    Sponsored by: AllCloud

    Orion, a leading supplier of carbon black, wanted to migrate its highly complex simulations of chemical processes to the cloud. The company partnered with AllCloud to prepare the cloud journey, resulting in 20% faster calculations and improved manufacturing processes. Access the case study to explore how AllCloud can support your cloud journey.

  • CW Middle East Oct to Dec 2016

    Sponsored by: TechTarget ComputerWeekly.com

    In this quarter's CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world.

  • Optimising content management workflows with AI

    Sponsored by: TechTarget ComputerWeekly.com

    This e-handbook explores how a pantheon of AI technologies -- from machine learning and natural language processing to image recognition and video search -- promises to revolutionise content management workflows and personalise customer experiences. Some words of caution, however. These are early days for AI-infused content management.

  • How to get a better deal on cyber insurance through IAM

    Sponsored by: One Identity

    Cyber insurance is a key risk management tool, but obtaining favorable coverage requires a strong security posture. Learn how identity and access management (IAM) maturity can improve your cyber insurance terms and premiums. Read the full e-book to discover IAM best practices for securing better cyber insurance.

  • Transforming Revenue Cycle Management with Intelligent Automation

    Sponsored by: AGS Health

    To find out how intelligent automation can transform revenue cycle management (RCM) for healthcare organizations, tap into this e-book.

  • The State of Cybersecurity in Healthcare

    Sponsored by: CyberMaxx

    To deepen your understanding of the state of cybersecurity in the healthcare industry, and to learn about 3 major security risks, download this 8-page white paper.

  • The Business Transformation Management Playbook: Combining Business And IT For Successful Transformation

    Sponsored by: SAP

    The business transformation playbook explores a 5-stage methodology for successful business transformation. Discover your current state, analyze dependencies, design your target state, implement changes, and operate your transformed business. Read the full e-book to learn how to drive effective business transformation.

  • Enterprise Guide to Open-Source Security with Python, R, and Anaconda

    Sponsored by: Anaconda

    Open-source software offers many benefits, but also introduces new security risks. This guide covers best practices for managing open-source packages, dependencies, and vulnerabilities to secure your Python and R software supply chain. Access the e-book now to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.