ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=10start=10start=10start=10start=30start=30"

  • Data governance more important now than ever

    Sponsored by: TechTarget ComputerWeekly.com

    As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.

  • Computer Weekly – 28 March 2023: Is TikTok really a security threat to your business?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, with the UK government becoming the latest administration to ban TikTok, we ask whether the controversial social media app is really a security threat to enterprises. Read the issue now.

  • Computer Weekly – 3 July 2018: Future-proofing Gatwick Airport's technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we go behind the scenes at London Gatwick Airport and talk to its CIO about a critical network upgrade to support passenger growth. Our latest buyer's guide examines automation and intelligent systems management. And we assess the latest technologies for boosting storage performance. Read the issue now.

  • Computer Weekly – 29 May 2018: Tech's role in tackling humanitarian crises

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we learn about how mobile connectivity is a lifeline for Syrian refugees in Turkey, thanks to the mobile network operators in that country. And our latest buyer's guide examines how modern network security enables digital transformation at a range of companies. Read the issue now.

  • Celestica decreases time-to-hire through remarkable efficiency plays

    Sponsored by: GEM

    Celestica, a leader in design and manufacturing, struggled with brand awareness and sourcing niche engineering roles. By using Gem, they saw a dramatic decrease in time-to-fill, an 87% offer-accept rate, and improved visibility into their recruiting process. Read the full case study to learn how Gem empowered Celestica's recruiting team.

  • A Computer Weekly buyer's guide to satellite broadband

    Sponsored by: TechTarget ComputerWeekly.com

    High-speed internet connectivity has become an essential utility for much of the world's population. In this 16-page buyer's guide, Computer Weekly looks at what makes the industry largely recession-proof, the obstacles 5G's roll-out must overcome and how reductions in satellite costs have boosted space-borne projects and services' popularity.

  • Building a High- Performance data and AI Organization

    Sponsored by: DataBricks

    This report explores how data and analytics leaders are delivering business results with cloud data and AI platforms. Key findings include the importance of sound data management, the challenges in scaling analytics and machine learning, and the role of open standards in future data architectures. Download the full report now to learn more.

  • Computer Weekly – 25 July 2017: How the DVLA is making driving digital

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we hear from the DVLA about how it is becoming a digital hub for motoring and moving away from its legacy IT. Our latest buyer's guide examines the future of data management. And we look at the importance of understanding the small print in your software licensing agreements. Read the issue now.

  • CW APAC, March 2022: Trend Watch: Storage management

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how open source is shaping data storage management and this year’s emerging cloud supplier trends.

  • 2024 Top Global Security Trends

    Sponsored by: Brivo

    This report presents the findings of Brivo’s recent security study, which gathers data from 850 security professionals across 8 countries. Download the report now to unlock the study’s key findings, including 3 key trends influencing the state of cybersecurity.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.