ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=10start=10start=10start=10start=30start=30"

  • Raspberry PI with Java: programming the internet of things

    Sponsored by: TechTarget ComputerWeekly.com

    In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.

  • Computer Weekly – 21 June 2022: Dreams come true – how data and communication saved a failing company

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the former CEO of bed retailer Dreams explains how digital, data and communication helped turn round a failing company. The UK government has a new digital strategy – but it all seems rather familiar. And we talk to the tech firms trialling a four-day working week. Read the issue now.

  • CW Benelux - May 2020: IT budgets up in the air as Covid-19 disrupts business

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly's annual IT priorities survey was carried out before the arrival of Covid-19 disrupted business plans. It found that more than half of the IT leaders in the Benelux region expected budgets to be higher this year than last, and digital transformation was to be the main recipient of budget increases.

  • Top 10 ANZ IT stories of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    From using machine learning to restore public confidence to startups that are making a dent in the DevOps space, ANZ organisations have been punching above their weight on the global technology stage. In this roundup, we recap the top 10 ANZ IT stories, including the opportunities and challenges that organisations in the region have faced in 2021.

  • Top Health IT Analytics Forecasts and Goals for the Coming Year

    Sponsored by: XtelligentMedia Healthcare

    Health IT analytics and artificial intelligence experts say that healthcare organizations should focus on AI governance, transparency, and collaboration in 2024.

  • Computer Weekly – 17 May 2022: Digitally transforming UK power networks for renewable energy

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the UK's power networks need to be digital transformed to be ready for renewable energy – and the role of open source. Wi-Fi 6 was meant to give a boost to wireless connectivity – we examine why adoption has stalled. And we look at what a quantum datacentre might be like. Read the issue now.

  • Enterprise Buyers’ Guide to Data Protection 2024

    Sponsored by: Veeam Software

    The Enterprise Buyers' Guide to Data Protection 2024 is designed to highlight key market trends and challenges while providing information on what capabilities and processes organizations should consider implementing.

  • CW Europe September 2019: Netherlands authorities halt datacentre construction and call for a policy rethink

    Sponsored by: TechTarget ComputerWeekly.com

    The Netherlands has for years attracted datacentre investment and has seen major construction projects. Amsterdam alone has 33 datacentres within a radius of 20km. So when the local authority in Amsterdam and Haarlemmermeer called an immediate halt to datacentre construction, it was a shock.

  • Computer Weekly – 8 November 2016: The march of the robot workers

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.

  • How to Evaluate Threat Intelligence Feeds

    Sponsored by: ReversingLabs

    Know When Software Is Malware. With this guide, you will learn how to evaluate open source and commercial threat intelligence feeds to ensure you have relevant and useful information about malware, ransomware, Indicators of Compromise (IoC) and threat actors, so that your team can identify malicious events and reduce noisy, time-consuming alerts.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.