ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=10"

  • Computer Weekly – 4 June 2019: GDPR one year on – is it working?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a year after the EU's General Data Protection Regulation (GDPR) came into force, we assess its progress. Fears of technology are holding back digital healthcare – we look at the tech that's bringing back a human touch. And we examine Microsoft's desktop management tools for Windows 10. Read the issue now.

  • CW Buyer's Guide to 5G mobile networking

    Sponsored by: TechTarget ComputerWeekly.com

    5G mobile networking has the potential to propel business into the future. In this 17-page buyer's guide, Computer Weekly looks at how to optimise 5G, the advantages of advanced communications and what Télécoms Sans Frontières has achieved through harnessing it.

  • What Human Behavior Can Teach Us About Effective B2B Marketing

    Sponsored by: BrightTALK by TechTarget

    Due to a variety of new technology and tools, marketing teams now have 360-degree view and insights into their audience. However, those insights mean nothing if you don’t know to utilize them to efficiently drive growth. So, how can you best decode audience behavior? Read through this guide to learn more.

  • Computer Weekly – 4 April 2023: Revitalising UK digital government

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the UK plummets down the international rankings for digital government, can its £400m identity system revitalise the UK's digital strategy? Read the issue now.

  • Computer Weekly buyer's guide to customer insight

    Sponsored by: TechTarget ComputerWeekly.com

    In this 14-page buyer's guide, Computer Weekly looks at how firms adapt to new behaviors, as well as utilize deep learning to gain better insights and use intelligent analytics apps to enhance interactions.

  • The Secure Access Maturity Model

    Sponsored by: StrongDM

    In order to provide an action-oriented approach to reducing the threat posed by all of those credentials, StrongDM built the Secure Access Maturity Model (SAMM).Download this white paper to unlock the full model and use it as a framework to evaluate your identity security systems, and guide you toward secure access maturity.

  • CW APAC April 2023 – Trend Watch: Business applications

    Sponsored by: TechTarget ComputerWeekly.com

    Tech's role in the workplace continues to grow. In this handbook, focused on business applications in the Asia-Pacific region, Computer Weekly looks at industry cloud platforms, how microservices improve customer experience, what automation brings to banking and Rimini Street's approach to third-party support

  • A Compact Guide to Large Language Models

    Sponsored by: DataBricks

    Large language models (LLMs) are becoming increasingly important in a variety of applications such as natural language processing, machine translation, code and text generation, and more. Read on to understand the recent rise of LLMs and discover strategies you can leverage to become more data-driven with an LLM.

  • Computer Weekly – 5 December 2023: Technologies to support hybrid working

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at technologies to support hybrid working – even when your business is as unique as farming. Read the issue now.

  • Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.