ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=10start=20"

  • The Secure Access Maturity Model

    Sponsored by: StrongDM

    In order to provide an action-oriented approach to reducing the threat posed by all of those credentials, StrongDM built the Secure Access Maturity Model (SAMM).Download this white paper to unlock the full model and use it as a framework to evaluate your identity security systems, and guide you toward secure access maturity.

  • CW Benelux August 2017

    Sponsored by: TechTarget ComputerWeekly.com

    The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.

  • Upgrade or rework: Pathway to application modernisation

    Sponsored by: TechTarget ComputerWeekly.com

    If there is one certainty in IT, it is that at some point, every shiny new application will become legacy. The tech sector is driven by a fast cadence of innovation, which means that last year's "must have" phenomenon quickly becomes stale and out-of-date. In this e-guide, we explore the different approaches to modernising outdated IT systems.

  • CIO Trends #9: Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue we take a look at how three banks in Finland are working together so they can free up resources that will help them keep pace with the tech changes in the industry. Also in this issue we look closely at the cloud first policy at shipping giant Maersk.

  • Computer Weekly – 19 December 2017: Navigating through digital change

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, IT leaders share the lessons learned and discuss best practice in digital transformation. We find out how SAP is addressing customer concerns about its indirect licensing policies. And we assess whether SME IT suppliers are making headway in selling to government CIOs. Read the issue now.

  • Computer Weekly - 1 June 2021: The technology that enabled Covid-19 genome sequencing success

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the scientists behind the UK's gene sequencing work during the coronavirus pandemic to find out how cloud and data analytics enabled their success. It's three years since GDPR entered into law – we assess its progress. And we examine low-code software development for a small business. Read the issue now.

  • Computer Weekly – 11 October 2022: Government bins IR35 reforms – what you need to know

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after the government scrapped its IR35 reforms, we examine what IT contractors need to know. With hybrid working, employee experience is a priority – we look at how it meshes with customer experience initiatives. And we assess the options for unstructured data storage in the cloud and on-premise. Read the issue now.

  • How Audit Compliance and Cloud Adoption Affects IT Security

    Sponsored by: Dell Software

    Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.

  • Active Data Governance Methodology

    Sponsored by: Alation

    This white paper explores an active, people-first approach to data governance that empowers users, formalizes existing practices, and delivers business value. Read on now to learn how to build a collaborative data governance community and drive continuous improvement.

  • Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.