ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=10"

  • Top trends shaping APAC's tech landscape in 2024

    Sponsored by: TechTarget ComputerWeekly.com

    While GenAI is not expected to supersede other IT priorities such as cloud, application development and cyber security, it will augment those areas by making it easier to build software and improve cyber resilience. In this round-up, we review some of the key IT trends that are likely to shape the industry across the region in 2024.

  • Computer Weekly – 1 May 2018: Making music with AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how artificial intelligence is being used in the creative industries such as music and books. TSB's IT meltdown is symptomatic of the tech challenges facing UK banks – we examine the issues. And our latest buyer's guide analyses the trends in big data. Read the issue now.

  • CIO Trends #9

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, take a look at some of our most popular articles on issues faced by IT decision-makers, such as the rise in IT buying decisions from outside the IT department, the importance of ethics in technology, and a look at how the Department for the Environment, Food and Rural Affairs is preparing its IT for the challenges of Brexit.

  • CW Benelux - November 2022 - January 2023: Heineken finds the right brew for digital

    Sponsored by: TechTarget ComputerWeekly.com

    Heineken's data management director has revealed some of the ways the company is using information technology to transform digitally. Also read how a PhD student in the Netherlands is detecting hidden messages on the internet by exploring the practice of steganography.

  • Computer Weekly - 26 October 2021: Managing cyber risk by integrating supply chains

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our new Buyer's Guide examines the security and IT integration challenges of modern supply chains – we also talk to the CEO of SolarWinds about how the company overcame its huge supply chain attack. And we look at how a small town in Lancashire was chosen to host the UK's National Cyber Force. Read the issue now.

  • Computer Weekly buyer's guide to customer insight

    Sponsored by: TechTarget ComputerWeekly.com

    In this 14-page buyer's guide, Computer Weekly looks at how firms adapt to new behaviors, as well as utilize deep learning to gain better insights and use intelligent analytics apps to enhance interactions.

  • Data quality emerges from Covid-19 more critical than ever

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.

  • Are Your Identity Security Practices Keeping Up?

    Sponsored by: WatchGuard Technologies, Inc.

    According to a recent report, in 2022 74% of breaches involved a human element, including stolen credentials and other identity-related resources. Download this infographic to unlock 5 questions that help you choose the right identity security solution.

  • Comprehensive Guide To Security Operations

    Sponsored by: Arctic Wolf

    Despite sizeable budgets and an array of technology solutions at their disposal, most security teams can barely keep up with the bombardment of threats targeting IT environments as the attack surface continues to expand. Access this guide to learn a pragmatic approach to reducing the risk and impact of an attack and improving security resiliency.

  • 2024 global threat report

    Sponsored by: CrowdStrike

    The advent of AI as a tool has lowered the barrier of entry for hackers, only adding fuel to the fire that is the rapidly expanding threat landscape. With this 2024 Global Threat Report, CrowdStrike’s elite Counter Adversary Operations team delivers actionable intelligence you can use to stay ahead of today’s threats. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.