ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=10start=20"

  • AI in Fraud Management: Uses cases, benefits and challenges

    Sponsored by: TechTarget ComputerWeekly.com

    AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.

  • How Hellenic Bank Transformed its Indirect Procurement Operations with GEP Software

    Sponsored by: GEP

    Hellenic Bank transformed its indirect procurement operations by deploying GEP's unified, AI-powered software platform. This case study highlights how the bank centralized and digitalized procurement, achieving benefits like cost reduction, faster cycle times, and strategic insights. Read the full case study to learn more.

  • Risk management is the beating heart of your cyber strategy

    Sponsored by: TechTarget ComputerWeekly.com

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.

  • Computer Weekly – 28 March 2023: Is TikTok really a security threat to your business?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, with the UK government becoming the latest administration to ban TikTok, we ask whether the controversial social media app is really a security threat to enterprises. Read the issue now.

  • A Computer Weekly E-guide to NAS

    Sponsored by: TechTarget ComputerWeekly.com

    In the guide we look at the fundamentals of NAS and the use cases it best suits, the range of file access storage products available including in the cloud and in hybrid operation between cloud and datacentre. We also examine the question of NAS backup, looking at the challenges that have accompanied it and the solutions available.

  • A Short Guide to Webinars for Demand Gen

    Sponsored by: BrightTALK by TechTarget

    The content you select for your demand gen programs plays a critical role in progressing potential customers through their buyer’s journey, particularly as B2B buyers defer to a digital-first process that places sales far too late in the game. Access this e-book to learn more.

  • Forrester Collaborative Work Management

    Sponsored by: Atlassian

    Tap into the findings of 155 collaboration leaders in this analyst report, and discover how collaboration tools enable innovation in a post-pandemic world.

  • Computer Weekly – 16 May 2023: Microsoft and Google go into battle for enterprise AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as developments in generative AI accelerate, Microsoft and Google have each unveiled plans around enterprise applications. Nobody doubts the importance of digital transformation – but experts say it won't work without cultural change as well. Read the issue now.

  • CW EMEA: Investing in the future

    Sponsored by: TechTarget ComputerWeekly.com

    There is a lot of uncertainty in the world right now, and businesses might be forgiven for taking a cautious approach to their planning. But one thing is certain, and that is that oil-rich countries in the Middle East will continue to invest heavily in diversifying their economies.

  • Top IT Predictions in APAC in 2023

    Sponsored by: TechTarget ComputerWeekly.com

    In this round-up, we review some of the key IT trends that are likely to shape the industry across the APAC region in 2023.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.