ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=10start=20"

  • How to achieve container security best practice

    Sponsored by: TechTarget ComputerWeekly.com

    In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.

  • How to achieve container security best practice

    Sponsored by: TechTarget ComputerWeekly.com

    In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.

  • Computer Weekly - 19 July 2022: Tracking the rise of homeworking across the UK

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, homeworking has more than doubled in the UK due to the pandemic – we look at the regional differences. The pressure is growing on cyber security teams – we find out how to avoid staff burnout and lost talent. And we examine the role that tech startups play in the growth of Amazon Web Services. Read the issue now.

  • Cloud applications boost agility, productivity for APAC businesses

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, find out how cloud-based apps are helping Iconic Hotels, Singapore Airlines and Seek to speed up digital transformation efforts and streamline IT operations, as well as how the Covid-19 outbreak is spurring more companies to turn to cloud.

  • Six Considerations When Planning Data Center Network Upgrades

    Sponsored by: Panduit

    Discover in this white paper the 6 secrets data center operators must know to avoid costly maintenance and changes in fiber cable infrastructure for years to come.

  • Case Study: M&A in action - How Majestic Wine paired with Naked Wines to fuel cloud-led digital transformation

    Sponsored by: TechTarget ComputerWeekly.com

    Find out how the acquisition of online-only wine retailer Naked Wines in 2015 has shaped the digital transformation plans of its parent company Majestic Wine

  • Serving up server hardware

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, find out why some companies are still hanging on to older hardware, the pros and cons of different types of server hardware, and what one Chinese tech giant is doing in the microprocessor space.

  • Get everyone involved in the diversity drive

    Sponsored by: TechTarget ComputerWeekly.com

    At a Computer Weekly diversity in tech event, more than 100 experts from the tech and employment sectors shared their ideas for improving diversity in the technology industry. Download the full report here.

  • CIO Trends #8: Benelux

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we reveal how the Netherlands are taking the lead in cybersecurity; how Brussels is gearing up to be an insurtech hub and why the Dutch decided to share details of a Russian hacking of a major organisation with the rest of the world.

  • CIO Trends #8: Benelux

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we reveal how the Netherlands are taking the lead in cybersecurity; how Brussels is gearing up to be an insurtech hub and why the Dutch decided to share details of a Russian hacking of a major organisation with the rest of the world.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.