ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=10start=10start=10start=10start=30start=30"

  • Top 10 IT security stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

  • The Total Economic Impact™ Of ServiceNow HR Service Delivery

    Sponsored by: ServiceNow

    Intentionally designing a cohesive employee experience is the key to higher levels of engagement, productivity, and retention for new hires. In this Forrester analyst report, examine the potential return on investment (ROI) your organization may realize by deploying HR Service Delivery.

  • Beyond the GenAI Hype - Real World Investments Use Cases and Concerns

    Sponsored by: Enterprise Strategy Group

    As the generative AI (GenAI) market accelerates, your business, like every business, is pressured to keep up. To strengthen your understanding of the present state of GenAI – including challenge areas, use cases and budget strategies – review this report by TechTarget’s Enterprise Strategy Group (ESG).

  • Essential Guide: APAC women in cyber security

    Sponsored by: TechTarget ComputerWeekly.com

    In Asia-Pacific, men continue to outnumber women in the growing field of cyber security - even as more women are entering the industry. The lack of awareness of the profession among students and unconscious biases in hiring processes are just some of the challenges that we must overcome before we can see more women in the profession.

  • Fintech : Meet ten financial services disruptors - Part Two

    Sponsored by: TechTarget ComputerWeekly.com

    Whether it's the insurance sector, lending or full service banking there are a number of companies, often still in their early stages, disrupting the financial services sector. But who are these companies, where do they come from, and what drives them? In this e-guide, the second in a series, we meet another ten of them.

  • 5 Pitfalls That Undermine Your AI Readiness - and How to Avoid Them

    Sponsored by: Qlik

    This white paper explores the 5 pitfalls that can undermine your AI readiness and how to avoid them. Inside, you'll discover the critical steps to build a robust data foundation, define clear business objectives, and mitigate AI risks and ethics concerns. Read the white paper to ensure your AI initiatives deliver tangible value.

  • Computer Weekly - 10 August 2021: Real-time data analytics in action

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the emerging applications of real-time analytics and highlight the challenges for businesses to maximise the benefits. EU experts are calling for reform of US surveillance laws – we look at the issues. And we talk to the co-CEO of HR software giant Workday. Read the issue now.

  • Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018

    Sponsored by: TechTarget ComputerWeekly.com

    David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.

  • Fit for a Secure Future

    Sponsored by: Vodafone

    This cybersecurity report details how you can become a Fit for the Future (FFTF) business; organizations that take a very different approach to security challenges, resulting in increased revenue, ESG commitment, and reduced impact from cybersecurity attacks. Explore the report here.

  • CIO Trends #11: Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    The Nordic region is a place where people aren't afraid to try out the latest digital technologies. In banking for example, the region is leading the way in the age of open banking. Read here why this might be the case. But it goes way beyond the technology itself and has a lot to do with the attitude to change in the region.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.