ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=10"

  • CIO and leadership survey 2017

    Sponsored by: TechTarget ComputerWeekly.com

    This survey of 80 CIOs and IT leaders by Coeus Consulting shows the technology and financial trends facing IT leaders and businesses.

  • Evaluating the Pillars of Responsible AI

    Sponsored by: Hitachi Pentaho

    As AI's role expands, responsible AI practices become increasingly crucial. This Enterprise Strategy Group research report covers key pillars like bias, fairness, and transparency, and how to align innovation with ethical AI development. Read on now to learn how you can build an effective, responsible AI strategy for your organization.

  • Elevate the Employee Experience with ESG

    Sponsored by: ServiceNow

    Environmental, social, and governance (ESG) mandates are top of mind for organizations everywhere. Explore this guide to 2023's top ESG opportunities, beginning with three ESG trends.

  • From fraud detection to protection

    Sponsored by: Teleperformance

    Any company that stores sensitive information is at risk for fraud. Whether it’s financial or personal data, if you have it, there is a good chance someone is trying to get at it. This problem is compounded even more with remote work and the rise of AI. All of this means it’s time to rethink your fraud prevention posture. Read on to learn more.

  • Computer Weekly – 20 February 2024: Flying into cloud – EasyJet's journey out of the datacentre to AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how EasyJet fills an aircraft every 10 seconds while migrating to the cloud and introducing AI. There's only 283 years to go until we have a diverse IT workforce – we find out why. And we examine how the UK anti-trust investigation into the cloud market could hit the big hyperscalers. Read the issue now.

  • The DevSecOps Playbook Practical Steps for Producing Secure Software

    Sponsored by: Veracode, Inc.

    What are practical steps for adopting DevSecOps? Find out in this 20-page e-book, which maps out how to build a modern software development workflow around security.

  • The DevSecOps Playbook

    Sponsored by: Veracode

    This e-book offers a practical guide on implementing DevSecOps to integrate security into the software development lifecycle. Dig into the guide to learn how to establish a common security language, onboard applications with automated scans, define security policies, triage findings, and prevent flaws.

  • Computer Weekly – 11 October 2016: Leadership bonus – analysing our UK salary survey

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our UK salary survey shows that IT leaders are benefiting from generous bonuses as tech becomes part of mainstream business. We find out how the internet of things is transforming the railway industry. And the CIO of the Williams F1 team explains how data analytics is boosting race performance. Read the issue now.

  • Annual Report On The State Of Application Security

    Sponsored by: Veracode

    In the current spectrum of cybersecurity, organizations are continuously trying to reduce their security debt, but what is just as important is to not introduce security flaws that can accumulate over the life of your applications, making them more vulnerable in the long run. Read on to learn more about the current state of application security.

  • Digital Experience Platforms Trends

    Sponsored by: Progress Software Corporation

    This e-book explores how organizations are leveraging digital experience platforms (DXPs) to drive digital transformation and customer experience. It covers the benefits of DXPs, such as increased agility and operational efficiencies, as well as the top technologies used to optimize digital experiences. Read the full e-book to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.