Search Results for "Juniper Researchstart=10start=10start=10start=10start=30start=30"
-
Buying an ATS: Everything you need to Know
Sponsored by: GreenhouseThis e-book explores the ATS purchasing process, covering when to switch, RFP best practices, integration needs, and more. Learn how to identify the right ATS for your business and streamline your hiring. Read the full e-book to discover insights from industry experts.
-
Data is pure gold in the right hands
Sponsored by: TechTarget ComputerWeekly.comApplying technology like machine learning to transaction data could significantly increase the proportion of money laundering activity that is detected. It is projects like this that are driving demand for data science skills. In this e-guide, read about the power of data against money laundering, and how to get the skills to turn data into gold.
-
Improve security and compliance
Sponsored by: Red HatSecure your Linux environment with Red Hat's effective approach to vulnerability identification, remediation, and compliance management. Learn best practices and explore integrated tools like Insights and Satellite. Read the full e-book to boost your security and compliance.
-
Untethered: How CIOs & CISOs Are Paving the Way for the New Hybrid Workforce
Sponsored by: ZscalerThis in-depth research report examines how CIOs and CISOs are overcoming the challenges of the hybrid workforce, including securing remote access and more. Download the full report to discover effective techniques for transitioning to a Zero Trust strategy.
-
A Computer Weekly buyer's guide to containerisation in the enterprise
Sponsored by: TechTarget ComputerWeekly.comContainerisation is becoming a key part of IT strategy. In this 12-page buyer's guide, Computer Weekly looks at how it can help businesses in a post-pandemic world, assesses the main considerationsfor Kubernetes backup and discusses how to manage enterprise-class containerisation.
-
Computer Weekly – 1 August 2023: We're doing AI all wrong
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, AI is being imposed on society from the top down and the socio-economic implications will cause problems – we talk to an expert who says there is a better way. We also find out how hackers – the good kind – are turning to AI to make their work more effective. Read the issue now.
-
The Big Book of Machine Learning Use Cases – 2nd Edition
Sponsored by: DataBricksThis E-book contains a collection of technical blogs, including code samples and notebooks, designed to equip you with practical machine learning use cases you can put to work right now. Read on to gain insights from industry thought leaders and learn how you can leverage machine learning to bring your business into the future.
-
CHAPTER 15: Working with the Command-Line Interface
Sponsored by: McGraw HillDownload this free chapter from ITF+ CompTIA IT Fundamentals to learn how to work with and decipher the command line interface, demonstrate fundamental commands and more.
-
Computer Weekly – 9 June 2020: How retailers are staying connected during their coronavirus shutdown
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at how the hard-hit retail sector has turned to technology to stay connected during the coronavirus lockdown. Our latest buyer's guide examines best practice in data quality. And we look at how remote working affects software development teams.
-
The currency of trust: why banks and insurers must make customer data safer and more secure
Sponsored by: TechTarget ComputerWeekly.comBanks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.