ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=10start=20"

  • The State of ‘Security by Design’

    Sponsored by: Brivo

    Is security an afterthought in building design? In order to answer this question and understand the state of security by design, Brivo commissioned a study involving 800 decision-makers deeply entrenched in the realms of architectural or engineering processes. Read on to learn more.

  • Get Up and Running on GKE Proven methodology created by expert Google Cloud Practitioners

    Sponsored by: Zencore

    Accelerate your GKE adoption with Zencore's comprehensive "Get Up and Running on GKE" service. Benefit from accelerated deployment, reduced risk, enhanced productivity, and improved efficiency. Leverage expert training, production-ready cluster deployment, and production workload assistance. Read the full product overview to learn more.

  • Computer Weekly – 31 July 2018: Learning digital government lessons from Estonia

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at one of the world's most digitally advanced nations, Estonia, and ask what the UK government can learn. We talk to Airbus about how aircraft manufacturers are prioritising cyber security. And we examine how AI and robots will augment – not replace – human productivity. Read the issue now.

  • Computer Weekly – 26 March 2024: What are IT buyers spending their money on?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal the technologies that IT buyers are spending their money on this year. The European CIO at PepsiCo explains how to make digital transformation go with a pop. And we look at the growing importance of cloud-to-cloud backup for data protection and resilience. Read the issue now.

  • CW ANZ: Taming the data beast

    Sponsored by: TechTarget ComputerWeekly.com

    Software-defined storage (SDS), which promises greater transparency and control over data, is an increasingly important tool in the enterprise technology armoury. In this issue of CW ANZ, we look at how Australian enterprises are turning to SDS to improve data management and direct data to different tiers of storage or to applications.

  • Are you one eDiscovery away from a budgetary meltdown?

    Sponsored by: TechTarget ComputerWeekly.com

    Using an online object storage platform with global namespaces can provide full data protection, high availability and easily managed eDiscovery in a way that fully supports the business, say analysts Clive Longbottom and Marcus Austin.

  • Designing Customer Conversations: Best Practices

    Sponsored by: Talkdesk

    To design customer conversations, it’s crucial to consider the user experiences and not just the artificial intelligence that’s behind the processes. However, to do this, companies need to know the dos and don’ts for successful virtual agents, as well as the basics for creating proper customer conversations. Access the guide to learn more.

  • Computer Weekly - 12 July 2022: The most influential people in UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal the 50 most influential people in UK IT for 2022, and talk to the winner of the 12th annual UKtech50, National Cyber Security Centre CEO Lindy Cameron. Also, we take an in-depth look at the crisis in chip supply and what's needed to solve it. Read the issue now.

  • Innovate And Transform With A Modern Application Platform

    Sponsored by: Red Hat

    Application transformation can help you modernize existing apps and build new cloud-native ones faster. Learn how Red Hat OpenShift provides an integrated platform, tools, and services to accelerate your journey in this e-book.

  • Innovate And Transform With A Modern Application Platform

    Sponsored by: Red Hat

    This Red Hat e-book explains transforming applications for agility and efficiency, covering trends like cloud-native development, AI/ML integration, and legacy app replatforming. The e-book dives into how OpenShift provides a platform to build, deploy, and manage apps with consistency and security. Read the e-book here.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.