ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=10"

  • Gigamon taps eBPF to inspect encrypted traffic with Precryption technology

    Sponsored by: Gigamon

    Network traffic monitoring faces challenges with encrypted traffic and hybrid cloud environments. Gigamon's Precryption technology leverages eBPF to inspect encrypted traffic before or after encryption, providing visibility without decryption. Read the full analyst report to learn more about this innovative approach.

  • How Fleet Management Can Improve Your Bottom Line

    Sponsored by: T-Mobile for Business

    In this e-book, uncover the 6 key areas where smarter, integrated fleet management technology can help you tackle your challenges head on.

  • Data is pure gold in the right hands

    Sponsored by: TechTarget ComputerWeekly.com

    Applying technology like machine learning to transaction data could significantly increase the proportion of money laundering activity that is detected. It is projects like this that are driving demand for data science skills. In this e-guide, read about the power of data against money laundering, and how to get the skills to turn data into gold.

  • Computer Weekly - 29 November 2022: How to stop data retention from killing the planet

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.

  • A Computer Weekly buyer's guide to deep learning

    Sponsored by: TechTarget ComputerWeekly.com

    Deep learning can help companies operate faster and more efficiently. In this 13-page buyer'sguide, Computer Weekly looks at the advanced tools available for developers building intelligentapps, the frameworks that can be used and the kit that can enhance a programmer's toolbox.

  • Customer-Centric Growth in a Shapeshifting Cybersecurity Market

    Sponsored by: TechTarget

    Cybersecurity vendors that have found success while weathering the many changes occurring across the landscape have one thing in common: they put their customers at the center of everything they do. Download this e-book to gain insights to help you take advantage of the market.

  • Unlocking Efficiency Through Digital Transformation

    Sponsored by: TeamViewer

    Now that your business has entered the digital transformation era, there is no going back. To succeed, you need resources that reinforce employee value. To unlock greater employee efficiency, there are three key improvement paths: Adoption, flexibility and support. Discover how TeamViewer Tensor helps you with all three in this eBook.

  • CW Innovation Awards Telecommunications Winner: Telekom Malaysia

    Sponsored by: TechTarget ComputerWeekly.com

    Telekom Malaysia has been driving automation efforts across the company, not only to serve customers more efficiently, but also to improve a slew of back office functions. Learn more about why they are the telecommunications project of the year.

  • Computer Weekly – 22 October 2019: Microsoft vs Google – who's winning the cloud email race?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.

  • Automating Data Governance Workflows: A step-by-step guide

    Sponsored by: Alation

    As data volumes grow, human data stewards struggle to keep up. But by automating data governance workflows, you can ensure data quality, compliance, and scalability. Download this white paper to learn how.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.