Search Results for "Juniper Researchstart=20start=20start=30start=20start=10"
-
CW ASEAN, November 2018: Blockchain is no 'magic wand' for security
Sponsored by: TechTarget ComputerWeekly.comBlockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.
-
Royal Holloway: Driverless vehicle security for military applications
Sponsored by: TechTarget ComputerWeekly.comExisting attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
-
Australia's cybersecurity game plan
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
-
The Growing Importance of Graph Databases for AI
Sponsored by: Amazon Web ServicesThis white paper aims to guide customers on how they improve the quality of GenAI applications using graphs to significantly enhance the capabilities of GenAI applications, ultimately driving competitive advantages and innovation.
-
The five roadblocks to integration productivity in a hybrid cloud world
Sponsored by: Software AGEnterprises face integration challenges with hybrid cloud. This white paper outlines five key roadblocks to hybrid cloud integration, and how to overcome them. Learn how it aids your enterprise in a multi-cloud world.
-
The Five Roadblocks To Integration Productivity In A Hybrid Cloud World
Sponsored by: webMethods + StreamSetsEnterprises face integration challenges with hybrid cloud. This white paper outlines five key roadblocks to hybrid cloud integration, and how to overcome them. Learn how it aids your enterprise in a multi-cloud world.
-
The Future of Financial Services: Part 2
Sponsored by: TechTarget ComputerWeekly.comIn the second part of our 'Future of Financial Services' e-guide series, read about how the financial services industry is not just being shaken up with cosmetic changes, but is about to go through the process of being stripped down and rebuilt.
-
Proving ownership of IPv6 addresses
Sponsored by: TechTarget ComputerWeekly.comIn this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
-
Creating pathways to stability for immigrating children and families
Sponsored by: ICFDiscover how ICF's expertise in child welfare, data science, and workforce optimization can help create pathways to stability for immigrating children and families. Learn best practices for inter-agency collaboration, data management, and training to support this vulnerable population. Read the e-book to learn more.
-
A 3-Step Guide to Creating Authentic B2B Webinar Content
Sponsored by: BrightTALK by TechTargetTo enhance marketing and sales content, B2B companies have turned to webinars to open the floor to live engagement and reach new prospects to deliver revenue growth. However, many struggle to direct well-executed webinars and connect with their audiences. Access this guide to learn the best practices.