ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=10start=10start=10start=10start=30start=30"

  • Buying an ATS: Everything you need to Know

    Sponsored by: Greenhouse

    This e-book explores the ATS purchasing process, covering when to switch, RFP best practices, integration needs, and more. Learn how to identify the right ATS for your business and streamline your hiring. Read the full e-book to discover insights from industry experts.

  • Data is pure gold in the right hands

    Sponsored by: TechTarget ComputerWeekly.com

    Applying technology like machine learning to transaction data could significantly increase the proportion of money laundering activity that is detected. It is projects like this that are driving demand for data science skills. In this e-guide, read about the power of data against money laundering, and how to get the skills to turn data into gold.

  • Improve security and compliance

    Sponsored by: Red Hat

    Secure your Linux environment with Red Hat's effective approach to vulnerability identification, remediation, and compliance management. Learn best practices and explore integrated tools like Insights and Satellite. Read the full e-book to boost your security and compliance.

  • Untethered: How CIOs & CISOs Are Paving the Way for the New Hybrid Workforce

    Sponsored by: Zscaler

    This in-depth research report examines how CIOs and CISOs are overcoming the challenges of the hybrid workforce, including securing remote access and more. Download the full report to discover effective techniques for transitioning to a Zero Trust strategy.

  • A Computer Weekly buyer's guide to containerisation in the enterprise

    Sponsored by: TechTarget ComputerWeekly.com

    Containerisation is becoming a key part of IT strategy. In this 12-page buyer's guide, Computer Weekly looks at how it can help businesses in a post-pandemic world, assesses the main considerationsfor Kubernetes backup and discusses how to manage enterprise-class containerisation.

  • Computer Weekly – 1 August 2023: We're doing AI all wrong

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, AI is being imposed on society from the top down and the socio-economic implications will cause problems – we talk to an expert who says there is a better way. We also find out how hackers – the good kind – are turning to AI to make their work more effective. Read the issue now.

  • The Big Book of Machine Learning Use Cases – 2nd Edition

    Sponsored by: DataBricks

    This E-book contains a collection of technical blogs, including code samples and notebooks, designed to equip you with practical machine learning use cases you can put to work right now. Read on to gain insights from industry thought leaders and learn how you can leverage machine learning to bring your business into the future.

  • CHAPTER 15: Working with the Command-Line Interface

    Sponsored by: McGraw Hill

    Download this free chapter from ITF+ CompTIA IT Fundamentals to learn how to work with and decipher the command line interface, demonstrate fundamental commands and more.

  • Computer Weekly – 9 June 2020: How retailers are staying connected during their coronavirus shutdown

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how the hard-hit retail sector has turned to technology to stay connected during the coronavirus lockdown. Our latest buyer's guide examines best practice in data quality. And we look at how remote working affects software development teams.

  • The currency of trust: why banks and insurers must make customer data safer and more secure

    Sponsored by: TechTarget ComputerWeekly.com

    Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.