ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=10start=20"

  • Domain Name System (DNS) Security

    Sponsored by: Cisco

    SRM leaders must fully understand the FedRAMP program, its security levels, and the authorization process to make informed cloud security decisions. Verify CSP FedRAMP status and ask probing questions. Remember that using a FedRAMP-authorized cloud does not absolve security responsibilities. Read the full Gartner Research Report to learn more.

  • Path to Resilience Building a Modern Security Program

    Sponsored by: Splunk

    Today’s SOC teams face a constellation of challenges. In this e-book, Splunk provides insights into how you can utilize SOC to solve these challenges and develop a unified approach to digital resilience. Read the e-book now to learn more.

  • Containers and storage 101: The fundamentals of container storage

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at the basics of Docker storage and backup, key containers capabilities in storage vendors' offers and how containers can be incorporated into the private cloud environment.

  • Improving Health by Addressing Social Needs: A Sustainable Path Forward

    Sponsored by: ZeOmega

    ZeOmega and the Center for Open Data Enterprise (CODE) have collaborated to create a powerful white paper addressing challenges related to Health-Related Social Needs (HRSN) interventions. Download it now to learn about opportunities to apply funding to address social needs.

  • CW Middle East ezine July 2018

    Sponsored by: TechTarget ComputerWeekly.com

    What more does a region need to be recognised as a technology leader than its very own valley, of the silicon variety? Where once only oil flowed down Saudi Arabia's economic valleys, tech has now taken a grip. Read in this issue about the country's ambitions in the tech sector.

  • The Pivot to Digital Transformation

    Sponsored by: Blue Yonder

    In this guide, explore how digitalization is driving the future of manufacturing, as well as the top strategies manufacturers are using right now to ensure supply chain visibility. Click here to learn more.

  • The Automation Architect’s Handbook: Leading End-To-End Automation Journeys

    Sponsored by: Red Hat

    In this automation architect’s guiding e-book, discover a walkthrough map of the steps required to lead your organization beyond task-centric automation toward an enterprise-wide strategy.

  • CIO Trends India

    Sponsored by: TechTarget ComputerWeekly.com

    CIOs in India have been put to the test as their organisations implement remote work arrangements amid the Covid-19 pandemic. We look at the impact of the coronavirus outbreak on India's IT industry, why a pandemic specific BCP matters and how CIOs can harden up their datacentre equipment supply chains post-Covid-19.

  • A Practical Guide to Zero Trust Implementation in Multicloud Environments

    Sponsored by: PC Connection

    Explore a practical guide to implementing a Zero Trust architecture in multicloud environments. Learn how to progress your Zero Trust maturity, select the right technologies, and work with a trusted partner. Read the full e-book to secure your modern IT ecosystem.

  • The Spreadsheet User’s Guide to Modern Analytics

    Sponsored by: Alteryx

    If you're working in spreadsheets to do analysis, 90% of your workday is taken up by menial tasks you'd rather not be doing. Formatting data sources. Cleaning and parsing. Applying formulas.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.