ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=10start=20"

  • Cloud-Native Meets Hybrid Cloud: A Strategy Guide

    Sponsored by: Red Hat

    As technologies evolve, organizations need to adopt new strategies to achieve success. This guide is designed as a strategy primer for enterprise architects and IT leaders to map out how to tackle modern IT strategy, focusing on the most important key trends. Read now to learn more.

  • Cloud-Native Meets Hybrid Cloud: A Strategy Guide

    Sponsored by: Red Hat

    The importance of IT systems is already clear. What isn’t as well known is the struggle IT teams face in trying to keep systems functional and secure while also finding ways to evolve current architecture to accommodate for innovation and improvements to business offerings. Read on to learn about an architecture that solves this challenge.

  • Computer Weekly – 29 May 2018: Tech's role in tackling humanitarian crises

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we learn about how mobile connectivity is a lifeline for Syrian refugees in Turkey, thanks to the mobile network operators in that country. And our latest buyer's guide examines how modern network security enables digital transformation at a range of companies. Read the issue now.

  • Computer Weekly – 4 February 2020: Ethics and the internet – how to build a web we can trust

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the steps being taken to ensure the future development of the web is ethical and open. We discuss the UK's cyber security skills gap and ask what more the government should be doing. And we find out how cloud technology could help people stop smoking. Read the issue now.

  • Finding Your Autonomous Supply Chain

    Sponsored by: Blue Yonder

    Due to its recent popularity, it’s become clear that automation in supply chains isn’t going anywhere any time soon. However, many organizations are still hesitant to implement this technology into their workforces and can find the process daunting. Access this guide to discover more.

  • Computer Weekly – 19 September 2023: Securing Eurovision's online voting system against cyber attacks

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we discover how Once.net and Cloudfare defended the 2023 Eurovision Song Contest against cyber attacks. Our buyer's guide continues to look at integrating software-as-a-service applications, with the governance of SaaS connectivity to the fore. Read the issue now.

  • CW Middle East - Oct-Dec 2019: Saudi banks trial biometrics in ATMs

    Sponsored by: TechTarget ComputerWeekly.com

    Biometric and blockchain technologies are being used in tandem to provide ID verification at Saudi Arabian cash machines.

  • Computer Weekly - 28 July 2020: Meet the CIO connecting IT in the most inhospitable environmentsts

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we discuss the challenges of running global IT in the world of copper mining. We look at how tech vendors are adapting their products to meet the lockdown demands of working from home. And we examine how zero-trust methods can help secure container technology. Read the issue now.

  • Computer Weekly - 28 July 2020: Meet the CIO connecting IT in the most inhospitable environments

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we discuss the challenges of running global IT in the world of copper mining. We look at how tech vendors are adapting their products to meet the lockdown demands of working from home. And we examine how zero-trust methods can help secure container technology. Read the issue now.

  • Royal Holloway: Protecting investors from cyber threats

    Sponsored by: TechTarget ComputerWeekly.com

    The cyber security of personal investors who use UK investment platforms to manage their pensions or savings is not well understood and not often discussed. In this Royal Holloway security article, we identify the principal cyber threats to investors' assets on UK investment platforms and what can be done to prevent or mitigate these threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.