ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=10start=20"

  • MicroScope – February 2021: The forecast on channel security

    Sponsored by: MicroScope

    MicroScope asks experts to share their opinions on what lies ahead for the channel in the security market, along with their predicitions for what upcoming threats to expect. Also read about how the managed service community helped to keep SMEs afloat during Covid-19, and how to arm the business with the best IAM tools for remote working

  • Managed IT and Security Guide

    Sponsored by: ARG, Inc.

    Whether you are concerned about skyrocketing cyberattack threats, debating a migration to the cloud or looking to enhance your talent pool, this e-book will answer all your questions. Download now to access your ultimate managed IT and security guide.

  • Understanding behavioural detection of antivirus

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.

  • Computer Weekly – 3 September 2024: The politics of techno-refusal

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we learn about the politics of techno-refusal and what can be learned from the sabotage of tech infrastructure in the 1980s. Following the controversy around Broadcom's purchase of VMware, we examine alternative virtualisation solutions. And our latest buyer's guide looks at the state of SD-WAN. Read the issue now.

  • Top Healthcare Industry Forecasts For This Year

    Sponsored by: XtelligentMedia Healthcare

    Affordability, workforce management, and technology are key topics among experts when offering healthcare industry predictions for 2024.

  • IT Organizations in a Quandary Over Visibility into Cloud Traffic

    Sponsored by: Gigamon

    Today, the push for the finalized IETF Transport Layer Security (TLS) 1.3 standard for network encryption continues to affect organization’s decisions. This white paper presents the key findings from a recent study conducted to investigate perceptions and beliefs of end users surrounding the adoption of the TLS 1.3 standard. Read on to learn more.

  • Three Steps to Authentic Connections in B2B

    Sponsored by: BrightTALK by TechTarget

    In today’s B2B marketplace, buyers no longer fall prey to one-size-fits-all marketing campaigns and pushy sales calls. Authenticity is key—and webinars and videos are key to achieving the human touch. They're also consistently ranked as the top performing content marketing tactics. Explore the 3 steps to authentic connections in B2B here.

  • CW Benelux - May 2020: IT budgets up in the air as Covid-19 disrupts business

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly's annual IT priorities survey was carried out before the arrival of Covid-19 disrupted business plans. It found that more than half of the IT leaders in the Benelux region expected budgets to be higher this year than last, and digital transformation was to be the main recipient of budget increases.

  • Computer Weekly – 21 May 2019: Managing software updates in Windows 10

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how technology is fighting poverty by increasing financial inclusion. We examine how best to manage the challenges of Microsoft's new plan for ongoing Windows 10 updates. And we find out how data innovation at Lloyd's of London is supporting a wider digital modernisation. Read the issue now.

  • Computer Weekly – 30 October 2018: A row is brewing over EU plans to curb datacentre energy use

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a row is brewing over an EU plan to curb datacentre energy use, and the leading server suppliers are not happy. Health secretary Matt Hancock tells us about his new technology vision for the NHS. And we examine the growing popularity of short-term "gig" employment for IT professionals. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.