ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=10"

  • Application security: More important than ever

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.

  • Computer Weekly - 21 September 2021: The cities planning for ethical use of AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to tech leaders in Barcelona and London about a collaboration to ensure ethical use of AI in the era of smart cities. The UK government wants to reform data protection law – we assess the implications. And we examine the latest best practice in hybrid cloud. Read the issue now.

  • Want To Drive Sustainability? Your AVEVA™ PI System™ Data Has The Power

    Sponsored by: Aveva

    In this white paper, you'll learn how AVEVA PI System's data management capabilities can drive sustainability initiatives. Read on now to discover how you can leverage your operations data to achieve your sustainability goals.

  • Data integration to support modern BI and advanced analytics programmes

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we discuss why data integration and preparation are the unsung heroes of modern BI and advanced analytics. More so than ever, it would seem, due to the ever-increasing volume and variety of data.

  • Next Generation Utilization Management Through Ai

    Sponsored by: XSOLIS

    In this white paper, you’ll discover how AI/ML deployed in operational contexts is becoming a valuable tool to meet the challenge of modernizing health systems and maintaining utilization management. Read on to understand how AI/ML-driven automation can dramatically improve traditional workflows for payers, providers, and ultimately, patients.

  • Ransomware Defense And Remediation With Pure Storage

    Sponsored by: Pure Storage

    Download this ESG Technical Validation to explore a detailed evaluation of the Pure Storage solution for ransomware mitigation and recovery, and dive deep into how Pure Storage can work with your organization for comprehensive ransomware protection before, during, and after an attack.

  • The State of Supply Chain Execution

    Sponsored by: Blue Yonder

    Recent years have seen a lot of stress for supply chain leaders, as organizations struggled to meet customer expectations and now are having trouble handling rising inflation. So, how can supply chain teams combat these hurdles while also improving profitability and future-proofing their operations? Dig into this guide to learn more.

  • A Computer Weekly E-Guide on Wired and Wireless LAN

    Sponsored by: TechTarget ComputerWeekly.com

    When looking the way in which the Covid-19 pandemic has changed business life, a number of key areas have come to the fore: SD WAN, SASE and in particular digital transformation are key examples of that. Yet very little of the discourse includes something that is still really at the heart of the vast majority of firms: The local area network (LAN).

  • Computer Weekly – 9 October 2018: NHS app marks a new era for UK health service

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the long-awaited mobile app from the NHS and ask what it means for a digital health service. We hear from early experimenters of blockchain to find out what it will take for the technology to be enterprise-ready. And we analyse the impact of M&A on corporate networks. Read the issue now.

  • Enterprise mobility management software offerings and use cases

    Sponsored by: TechTarget ComputerWeekly.com

    Enterprise mobility management software allows IT to deploy security policies and provide access to internal resources by integrating with APIs in the mobile OSes. This e-guide shows enterprise mobility management software offerings and use cases.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.