Search Results for "Juniper Researchstart=20start=20start=30start=20start=10"
-
Finding Your Autonomous Supply Chain
Sponsored by: Blue YonderDue to its recent popularity, it’s become clear that automation in supply chains isn’t going anywhere any time soon. However, many organizations are still hesitant to implement this technology into their workforces and can find the process daunting. Access this guide to discover more.
-
Cloud-Native Meets Hybrid Cloud: A Strategy Guide
Sponsored by: Red HatAs technologies evolve, organizations need to adopt new strategies to achieve success. This guide is designed as a strategy primer for enterprise architects and IT leaders to map out how to tackle modern IT strategy, focusing on the most important key trends. Read now to learn more.
-
Cloud-Native Meets Hybrid Cloud: A Strategy Guide
Sponsored by: Red HatThe importance of IT systems is already clear. What isn’t as well known is the struggle IT teams face in trying to keep systems functional and secure while also finding ways to evolve current architecture to accommodate for innovation and improvements to business offerings. Read on to learn about an architecture that solves this challenge.
-
Computer Weekly – 4 February 2020: Ethics and the internet – how to build a web we can trust
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the steps being taken to ensure the future development of the web is ethical and open. We discuss the UK's cyber security skills gap and ask what more the government should be doing. And we find out how cloud technology could help people stop smoking. Read the issue now.
-
Computer Weekly – 29 May 2018: Tech's role in tackling humanitarian crises
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we learn about how mobile connectivity is a lifeline for Syrian refugees in Turkey, thanks to the mobile network operators in that country. And our latest buyer's guide examines how modern network security enables digital transformation at a range of companies. Read the issue now.
-
Computer Weekly – 19 September 2023: Securing Eurovision's online voting system against cyber attacks
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we discover how Once.net and Cloudfare defended the 2023 Eurovision Song Contest against cyber attacks. Our buyer's guide continues to look at integrating software-as-a-service applications, with the governance of SaaS connectivity to the fore. Read the issue now.
-
Computer Weekly - 28 July 2020: Meet the CIO connecting IT in the most inhospitable environmentsts
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we discuss the challenges of running global IT in the world of copper mining. We look at how tech vendors are adapting their products to meet the lockdown demands of working from home. And we examine how zero-trust methods can help secure container technology. Read the issue now.
-
Computer Weekly - 28 July 2020: Meet the CIO connecting IT in the most inhospitable environments
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we discuss the challenges of running global IT in the world of copper mining. We look at how tech vendors are adapting their products to meet the lockdown demands of working from home. And we examine how zero-trust methods can help secure container technology. Read the issue now.
-
CW Middle East - Oct-Dec 2019: Saudi banks trial biometrics in ATMs
Sponsored by: TechTarget ComputerWeekly.comBiometric and blockchain technologies are being used in tandem to provide ID verification at Saudi Arabian cash machines.
-
Royal Holloway: Protecting investors from cyber threats
Sponsored by: TechTarget ComputerWeekly.comThe cyber security of personal investors who use UK investment platforms to manage their pensions or savings is not well understood and not often discussed. In this Royal Holloway security article, we identify the principal cyber threats to investors' assets on UK investment platforms and what can be done to prevent or mitigate these threats.