Search Results for "Juniper Researchstart=20start=20start=30start=10start=20"
-
CW ASEAN, November 2018: Blockchain is no 'magic wand' for security
Sponsored by: TechTarget ComputerWeekly.comBlockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.
-
The rise of SD-WANs: Time to cross the chasm
Sponsored by: TechTarget ComputerWeekly.comWhere does SD-WAN stand at the beginning of the second quarter of 2022? The solid upward trajectory of SD-WANs has been given further impetus by the parallel emergence and rise of SASE, which integrates SD-WAN with edge security, and the rise persists as SD-WAN pricing becomes more competitive and monitoring capabilities become popular.
-
So you Think you’re Ready for AI?
Sponsored by: Ensono, LLCIn this white paper, you'll discover the 5 essentials for achieving AI excellence - from building a robust business case to ensuring data readiness and security. Read on now to learn how to harness the full potential of AI and drive innovation, efficiency, and competitive advantage.
-
A Computer Weekly Buyer's Guide: Office Productivity for Home Workers
Sponsored by: TechTarget ComputerWeekly.comThe question of productivity has become an inevitable consideration since the pandemic made home working commonplace. In this 16-page buyer's guide, Computer Weekly looks at how it's being maintained, the advantages a remote workforce brings to business and the hybrid model being embraced by workers.
-
Royal Holloway: Driverless vehicle security for military applications
Sponsored by: TechTarget ComputerWeekly.comExisting attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
-
Proving ownership of IPv6 addresses
Sponsored by: TechTarget ComputerWeekly.comIn this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
-
Protecting the IT attack surface while advancing digital transformation
Sponsored by: TaniumTo survive and to thrive, organizations must continue innovating, launching new products and services, and optimizing old ones. As a result, every organization’s attack surface will continue to change and, likely, grow. Learn how business leaders can keep up with these changes in this latest technical deep dive from Tanium experts.
-
The Growing Importance of Graph Databases for AI
Sponsored by: Amazon Web ServicesThis white paper aims to guide customers on how they improve the quality of GenAI applications using graphs to significantly enhance the capabilities of GenAI applications, ultimately driving competitive advantages and innovation.
-
Data Fabric For Dummies
Sponsored by: Hitachi PentahoIn this digital edition of the popular For Dummies series of reference books, step into the world of data fabrics: inside, learn what a data fabric is and how to realize its benefits, how to effectively build and deploy a data fabric, best practices for optimizing and modernizing data access, and more.
-
The Future of Financial Services: Part 2
Sponsored by: TechTarget ComputerWeekly.comIn the second part of our 'Future of Financial Services' e-guide series, read about how the financial services industry is not just being shaken up with cosmetic changes, but is about to go through the process of being stripped down and rebuilt.