ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=20"

  • CW APAC, April 2022: Trend Watch: Cyber security

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access

  • Computer Weekly – 17 September 2024: The pillars of AI strategy

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the CIO of Currys about the electronics retailer's AI strategy. We examine how China has become a leader in open source software – and what it means for the rest of the world. And we look at how AI is supporting networking alongside how to implement networking to support AI. Read the issue now.

  • How To Identify And Develop High-Potential Employees With HR Tech

    Sponsored by: Sage

    Discover how to identify and develop high-potential employees using HR tech. Learn 6 essential steps to find and empower your organization's future stars. Download this e-book to unlock insights and build a successful high-potential program.

  • CW Nordics November 2017

    Sponsored by: TechTarget ComputerWeekly.com

    The Nordic countries are pace-setters when it comes to digital transformation and although there is a wealth of IT talent in the region, it seems it is not enough.

  • A Computer Weekly buyer's guide to application modernisation

    Sponsored by: TechTarget ComputerWeekly.com

    In this 15-page buyer's guide, Computer Weekly investigates how organisations are approaching the modernisation, replatforming and migration of legacy applications. We look at the tools and technologies available, change management, and the use of APIs and containerisation to make legacy functionality to cloud-native applications.

  • The DevSecOps Playbook

    Sponsored by: Veracode

    This e-book offers a practical guide on implementing DevSecOps to integrate security into the software development lifecycle. Dig into the guide to learn how to establish a common security language, onboard applications with automated scans, define security policies, triage findings, and prevent flaws.

  • The DevSecOps Playbook Practical Steps for Producing Secure Software

    Sponsored by: Veracode, Inc.

    What are practical steps for adopting DevSecOps? Find out in this 20-page e-book, which maps out how to build a modern software development workflow around security.

  • CW APAC, October 2021: Tech Career Guide

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks what is being done to close cyber security’s gender gap in the Asia-Pacific region

  • Creating A Successful IT Asset Management Plan

    Sponsored by: Scalepad Software

    In this white paper, discover the secrets to creating a successful IT asset management plan, and how make sure MSPs are always staying ahead of their clients’ needs, instead of catching up.

  • From fraud detection to protection

    Sponsored by: Teleperformance

    Any company that stores sensitive information is at risk for fraud. Whether it’s financial or personal data, if you have it, there is a good chance someone is trying to get at it. This problem is compounded even more with remote work and the rise of AI. All of this means it’s time to rethink your fraud prevention posture. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.