ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=10start=10start=10start=10start=30start=30"

  • A Deep Dive into Shadow IT: Examples, Risks, and Solutions

    Sponsored by: Auvik Networks, Inc.

    Shadow IT threatens data security and compliance. In this white paper, discover examples like unapproved comms tools or personal devices, and learn how to tackle shadow IT risks and solutions.

  • Computer Weekly – 11 June 2019: Are schools delivering on digital skills?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the differing approaches to teaching computer science across the UK and assess the pros and cons of each. Our latest buyer's guide examines the technologies and best practices of multicloud environments. And we find out what you get for your money when buying cyber insurance. Read the issue now.

  • Computer Weekly – 22 November 2016: IT spreads innovation at Unilever

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how consumer goods giant Unilever has changed its thinking about IT to support a global digital transformation. The UK boss of Hewlett Packard Enterprise assesses progress after the first year since HP split in two. And we examine how software development is changing in the enterprise. Read the issue now.

  • How generative AI is reducing administrative burden in healthcare

    Sponsored by: XtelligentMedia Healthcare

    Over 90% of healthcare workers feel optimistic about the promise of generative AI in healthcare to alleviate administrative burdens, according to a new survey.

  • Embedded Analytics for Dummies

    Sponsored by: Qlik

    In this digital edition of the popular For Dummies series of reference books, explore how embedded analytics can transform your organization by delivering insights where users need them most. Learn how to choose the right cloud analytics platform, design a successful embedded analytics system, and more.

  • Computer Weekly – 22 January 2019: Moving beyond network boundaries

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.

  • A Computer Weekly buyer's guide to API management

    Sponsored by: TechTarget ComputerWeekly.com

    Application programming interfaces define the correct way for a developer to request services from an operating system. In this 14-page buyer's guide, Computer Weekly looks at how they provide connectivity, the key role of digital bonding, and the importance of keeping APIs up to date and secure.

  • Computer Weekly – 15 October 2024: A future of virtual collaboration

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how immersive technologies such as augmented and virtual reality are set to transform workplace collaboration. We look at how AI is helping to deliver improvements in customer experience. And we analyse the problems in the Post Office project to replace its troubled Horizon IT system. Read the issue now.

  • Powerful DDoS Attacks & Recovery for Enterprises

    Sponsored by: Arbor Networks

    A series of potent, record-setting DDoS attacks hit several targets in 2016 using IoT malware to infect and leverage a large number of internet connect devices. Inside this guide, experts reveal 11 key takeaways for this type of attack and real-world examples of companies suffering from the aftermath including Dyn.

  • Get everyone involved in the diversity drive

    Sponsored by: TechTarget ComputerWeekly.com

    At a Computer Weekly diversity in tech event, more than 100 experts from the tech and employment sectors shared their ideas for improving diversity in the technology industry. Download the full report here.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.