ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=10start=10start=10start=10start=30start=30"

  • Six Critical Capabilities of Saviynt’s Application Access Governance

    Sponsored by: Saviynt

    Moving to Zero Trust can improve security while enabling users with right-time, right-level access. The process requires moving from a mindset of implicit trust to the continuous re-evaluation of risk. Read this white paper to learn more about the three key aspects to a successful Zero Trust adoption.

  • CW Benelux August 2019: Dutch academic seeks the personality behind the cyber criminal

    Sponsored by: TechTarget ComputerWeekly.com

    There is at least one person behind every cyber attack, but beyond that insight, very little known is about them. Rutger Leukfeldt, senior researcher on cyber crime at the Netherlands Institute for the Study of Crime and Law Enforcement, has been trying to get inside the minds of hackers.

  • Computer Weekly - 1 December 2020: How retailers are using technology to survive

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, with high-street retailers struggling to survive, we look at how technology can keep stores relevant. Everyone is focusing on flash storage, but hard disk drives are still an essential part of the IT toolkit. And we examine the latest developments in the ongoing Post Office Horizon IT scandal. Read the issue now.

  • Europe IT Priorities 2016

    Sponsored by: TechTarget ComputerWeekly.com

    Every year, Computer Weekly and TechTarget conduct a global survey of our readers to understand their technology spending priorities for the coming 12 months. Our research offers a unique insight into the purchasing decisions of IT decision-makers worldwide.

  • A Computer Weekly buyer's guide to customer and employee experience management

    Sponsored by: TechTarget ComputerWeekly.com

    Businesses are facing new challenges to meet the expectations of customers and employees. In this 14-page buyer's guide, Computer Weekly looks at the benefits of the experience economy, the customer service implications of always-on mobile users and how digital platforms can engage customers across all channels.

  • Top 10 ANZ IT stories of 2022

    Sponsored by: TechTarget ComputerWeekly.com

    In this roundup, Computer Weekly recaps the top 10 stories in Australia and New Zealand (ANZ), including the opportunities and challenges that organisations in the region have faced over the past year.

  • Case study: Using pre-fab datacentres to meet Norway's growing demand for colocation space

    Sponsored by: TechTarget ComputerWeekly.com

    Datacentre operator Green Mountain embraces Schneider Electric's pre-fabricated datacentre designs to ensure it is positioned to respond to the growing demand from the hyperscale and HPC communities for colocation capacity in Norway

  • CW APAC - June 2021: Career guide to cloud computing

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at the skills required for cloud professionals to succeed in an evolving industry, the risk to jobs posed by automation and the disciplines being taught at Future Tech Academy

  • Computer Weekly – 19 September 2023: Securing Eurovision's online voting system against cyber attacks

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we discover how Once.net and Cloudfare defended the 2023 Eurovision Song Contest against cyber attacks. Our buyer's guide continues to look at integrating software-as-a-service applications, with the governance of SaaS connectivity to the fore. Read the issue now.

  • AI-Powered Cloud-Hosted Voice Revolutionising Employee Experiences

    Sponsored by: Zoom Video Communications

    Cloud-hosted voice powered by AI can transform employee experiences by enhancing collaboration, productivity, and compliance. This IDC InfoBrief explores how cloud voice can revolutionize the future of work. Read the full report to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.