ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=10"

  • Royal Holloway: Security evaluation of network traffic mirroring in public cloud

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.

  • Ensuring Business Reliability and Reputation through Service-level Objectives

    Sponsored by: Nobl9

    Discover in this white paper why, instead of building their own SLO solutions in-house, many companies can benefit from working with vendors that deliver simplified, prebuilt platforms.

  • A Computer Weekly buyer's guide to satellite broadband

    Sponsored by: TechTarget ComputerWeekly.com

    High-speed internet connectivity has become an essential utility for much of the world's population. In this 16-page buyer's guide, Computer Weekly looks at what makes the industry largely recession-proof, the obstacles 5G's roll-out must overcome and how reductions in satellite costs have boosted space-borne projects and services' popularity.

  • CW Benelux - November 2021-January 2022: Dutch IT company rips up the HR rule book for better work-life balance

    Sponsored by: TechTarget ComputerWeekly.com

    One Dutch tech firm has used learnings from the pandemic to rip up its HR rule book and implement an official work-from-home policy. In fact, Infolearn has gone further than hybrid working, with a personal mobility budget for staff and a four-day working week.

  • February ezine: Look to the future

    Sponsored by: MicroScope

    An issue with plenty of predictions about what the year ahead holds for the channel

  • Computer Weekly – 22 January 2019: Moving beyond network boundaries

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.

  • Sentinel Accelerates Scaling of Lunit's AI Cancer Detection

    Sponsored by: Thales

    Lunit, a Korean tech company, has harnessed the power of AI to detect early-stage cancers, enabling timely management and increased survival rates. Their innovative and affordable solutions are making waves in the medical world. Learn more about Lunit's transformative technology in this white paper.

  • Top-Ten Global Automaker Uses Financial Acumen to Drive Innovation

    Sponsored by: Rimini Street

    Hyundai Motor Group leveraged third-party maintenance from Rimini Street to reduce Oracle Database costs by 50%, freeing up budget for strategic IT investments. The elevated support quality and responsiveness also ensured mission-critical system uptime. Read the full case study to learn more.

  • To Migrate to The Cloud or Stay On-Prem?

    Sponsored by: US Analytics

    Today, many organizations have one question on their minds: do they migrate their operations to the cloud or should they stay on-prem? The answer may be different for everyone, but understanding what’s best for your needs may be tricky. Browse this white paper to learn more.

  • Computer Weekly – 4 October 2016: How Microsoft aims to tackle information overload

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the firm wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer's guide looks at network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.