Search Results for "Juniper Researchstart=20start=20start=30start=20start=10"
-
Computer Weekly – 4 June 2019: GDPR one year on – is it working?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, a year after the EU's General Data Protection Regulation (GDPR) came into force, we assess its progress. Fears of technology are holding back digital healthcare – we look at the tech that's bringing back a human touch. And we examine Microsoft's desktop management tools for Windows 10. Read the issue now.
-
CW Buyer's Guide to 5G mobile networking
Sponsored by: TechTarget ComputerWeekly.com5G mobile networking has the potential to propel business into the future. In this 17-page buyer's guide, Computer Weekly looks at how to optimise 5G, the advantages of advanced communications and what Télécoms Sans Frontières has achieved through harnessing it.
-
What Human Behavior Can Teach Us About Effective B2B Marketing
Sponsored by: BrightTALK by TechTargetDue to a variety of new technology and tools, marketing teams now have 360-degree view and insights into their audience. However, those insights mean nothing if you don’t know to utilize them to efficiently drive growth. So, how can you best decode audience behavior? Read through this guide to learn more.
-
Computer Weekly – 4 April 2023: Revitalising UK digital government
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as the UK plummets down the international rankings for digital government, can its £400m identity system revitalise the UK's digital strategy? Read the issue now.
-
Computer Weekly buyer's guide to customer insight
Sponsored by: TechTarget ComputerWeekly.comIn this 14-page buyer's guide, Computer Weekly looks at how firms adapt to new behaviors, as well as utilize deep learning to gain better insights and use intelligent analytics apps to enhance interactions.
-
The Secure Access Maturity Model
Sponsored by: StrongDMIn order to provide an action-oriented approach to reducing the threat posed by all of those credentials, StrongDM built the Secure Access Maturity Model (SAMM).Download this white paper to unlock the full model and use it as a framework to evaluate your identity security systems, and guide you toward secure access maturity.
-
CW APAC April 2023 – Trend Watch: Business applications
Sponsored by: TechTarget ComputerWeekly.comTech's role in the workplace continues to grow. In this handbook, focused on business applications in the Asia-Pacific region, Computer Weekly looks at industry cloud platforms, how microservices improve customer experience, what automation brings to banking and Rimini Street's approach to third-party support
-
A Compact Guide to Large Language Models
Sponsored by: DataBricksLarge language models (LLMs) are becoming increasingly important in a variety of applications such as natural language processing, machine translation, code and text generation, and more. Read on to understand the recent rise of LLMs and discover strategies you can leverage to become more data-driven with an LLM.
-
Computer Weekly – 5 December 2023: Technologies to support hybrid working
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, our latest buyer's guide looks at technologies to support hybrid working – even when your business is as unique as farming. Read the issue now.
-
Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.