Search Results for "Juniper Researchstart=20start=20start=30start=20start=10"
-
Royal Holloway: Security evaluation of network traffic mirroring in public cloud
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.
-
Ensuring Business Reliability and Reputation through Service-level Objectives
Sponsored by: Nobl9Discover in this white paper why, instead of building their own SLO solutions in-house, many companies can benefit from working with vendors that deliver simplified, prebuilt platforms.
-
A Computer Weekly buyer's guide to satellite broadband
Sponsored by: TechTarget ComputerWeekly.comHigh-speed internet connectivity has become an essential utility for much of the world's population. In this 16-page buyer's guide, Computer Weekly looks at what makes the industry largely recession-proof, the obstacles 5G's roll-out must overcome and how reductions in satellite costs have boosted space-borne projects and services' popularity.
-
CW Benelux - November 2021-January 2022: Dutch IT company rips up the HR rule book for better work-life balance
Sponsored by: TechTarget ComputerWeekly.comOne Dutch tech firm has used learnings from the pandemic to rip up its HR rule book and implement an official work-from-home policy. In fact, Infolearn has gone further than hybrid working, with a personal mobility budget for staff and a four-day working week.
-
February ezine: Look to the future
Sponsored by: MicroScopeAn issue with plenty of predictions about what the year ahead holds for the channel
-
Computer Weekly – 22 January 2019: Moving beyond network boundaries
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.
-
Sentinel Accelerates Scaling of Lunit's AI Cancer Detection
Sponsored by: ThalesLunit, a Korean tech company, has harnessed the power of AI to detect early-stage cancers, enabling timely management and increased survival rates. Their innovative and affordable solutions are making waves in the medical world. Learn more about Lunit's transformative technology in this white paper.
-
Top-Ten Global Automaker Uses Financial Acumen to Drive Innovation
Sponsored by: Rimini StreetHyundai Motor Group leveraged third-party maintenance from Rimini Street to reduce Oracle Database costs by 50%, freeing up budget for strategic IT investments. The elevated support quality and responsiveness also ensured mission-critical system uptime. Read the full case study to learn more.
-
To Migrate to The Cloud or Stay On-Prem?
Sponsored by: US AnalyticsToday, many organizations have one question on their minds: do they migrate their operations to the cloud or should they stay on-prem? The answer may be different for everyone, but understanding what’s best for your needs may be tricky. Browse this white paper to learn more.
-
Computer Weekly – 4 October 2016: How Microsoft aims to tackle information overload
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the firm wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer's guide looks at network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.