ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=10start=20"

  • Automated document management system tools transform workflows

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we examine the components of a viable DMS and the technologies influencing its broader acceptance, how e-signatures are powering DM Simplementations, the differences between electronic and digital signatures, and the role of automated document management system tools in ensuring continuity for the new hybrid workforce.

  • Computer Weekly – Dell Technologies aims for an intelligent, connected future

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as Dell and EMC complete the largest IT supplier merger in history, we look at the new company's strategy. Our latest buyer's guide examines a key aspect of using cloud – cloud bursting. And we assess the latest views on the UK government's plans for internet surveillance legislation. Read the issue now.

  • Single-Vendor SASE For Dummies, 2nd Fortinet Special Edition

    Sponsored by: Fortinet, Inc.

    This guide introduces you to Single-Vendor SASE – the delivery of networking and security capabilities from one vendor in a unified solution. Learn how consolidation can help IT network and security teams drive operational efficiency, reduce costs, and more.

  • CW Middle East ezine April 2018

    Sponsored by: TechTarget ComputerWeekly.com

    The Middle East region is on a path, or even fast track, to becoming a global digital hub. But any country or region heading in this direction will have some fundamentals to get right.

  • A Computer Weekly buyer's guide to AI, ML and RPA

    Sponsored by: TechTarget ComputerWeekly.com

    In this 16-page buyer's guide, Computer Weekly looks at the evolution of productivity bots, the pros and cons of putting AI and ML applications in the cloud, and the growing number of injustices involving algorithms and automated decision-making

  • Computer Weekly – 19 December 2023: The ransomware threat to UK critical infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a parliamentary report warns that a lack of ransomware preparedness at the highest levels of government is leaving UK critical national infrastructure dangerously exposed – we analyse the risks. We also examine how AI tools are helping to enhance cloud security. Read the issue now.

  • A Computer Weekly Buyer's Guide to Internet of Things Security

    Sponsored by: TechTarget ComputerWeekly.com

    In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.

  • Maximizing Data Value in the Age of AI

    Sponsored by: Qlik

    This white paper explores how data products can help organizations maximize the value of their data and accelerate business outcomes while enhancing data trust and governance. Read on to learn how you can build effective data products and a federated data strategy to drive strategic business success.

  • Jargon buster guide to hybrid cloud storage

    Sponsored by: TechTarget ComputerWeekly.com

    In this Jargon Buster guide we bring you definitions for the key concepts in hybrid cloud storage plus in-depth articles on hybrid cloud file and object storage, how to use the cloud as a storage tier and the key decision points when it comes to private cloud vs hybrid cloud.

  • The Six Principles Of AI-Ready Data Establishing A Trusted Data Foundation For AI

    Sponsored by: Qlik

    In this white paper, you'll find out how to establish a trusted data foundation for AI with 6 key principles: data must be diverse, timely, accurate, secure, discoverable, and consumable by machine learning and large language models. Read on now to learn how you can unlock your organization's AI potential.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.