ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=20"

  • Top 10 business applications stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    The steady incursion of artificial intelligence (AI) into enterprise software was a major theme behind Computer Weekly's indepth stories in this area in 2019. Human versus machine is the opposition that looms over much of the coverage here. Here are Computer Weekly's top 10 business applications stories of 2019.

  • AI proves value in HR, but handle with care

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, discover how the allocation of work by algorithm might have advantages for workers as well as employers, how AI is proving its value for HR and how data analytics is being used to support expansion and development.

  • APAC career guide: Becoming a cyber security pro

    Sponsored by: TechTarget ComputerWeekly.com

    Once the sole domain of highly technical geeks poring over security logs to look for signs of hackers lurking in their networks, cyber security has become more multi-dimensional and varied across specialisations, organisations and industries. In this e-guide, learn what it takes to become a successful cyber security pro in APAC.

  • Pros and Cons of the 6 Main Customer Service Channels

    Sponsored by: Oracle Corporation

    Where should you allocate resources to most effectively engage with current and potential customers? In this expert e-guide, Scott Sachs of SJS Solutions weighs the pros and cons of the 6 main customer service channels: Chat/video chat, phone, email, social media, customer self-service, and mobile.

  • Reliability Keeping The Trains On Track

    Sponsored by: Schneider Electric

    In 2018, with the advent of the Commonwealth games, Queensland Rail expected 1.5 million visitors to descend on the state. In response Schneider Electric was tasked with designing a new substation using a range of solutions based on EcoStruxure Power. Download the full case study to learn more.

  • In 2017, the insider threat epidemic begins

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.

  • Making the Move to Modern IGA Expert Insights To Transition Your Legacy Identity Platform

    Sponsored by: Saviynt

    This guide shares expert advice on preparing for, executing, and measuring a modernization campaign’s success. Insights surround building consensus, evaluating platforms, managing migration, and measuring success. Importantly, it also features real-world examples from practitioners on the other side of successful transitions. Read the guide today!

  • Transforming Project Management With The Right Tools And Ways Of Working

    Sponsored by: Atlassian

    Discover how to transform project management with the right tools and ways of working. Learn to set up projects for success, plan team work, manage ongoing tasks, and assess performance - all within a unified Atlassian work management platform. Read the full e-book to learn more.

  • NAS meets cloud and unstructured data challenges

    Sponsored by: TechTarget ComputerWeekly.com

    NAS file access storage has progressed to meet the challenges of the cloud era. This e-guide provides key insights into NAS as we know it in the era of cloud and big, unstructured data sets.

  • CW EMEA: Investing in the future

    Sponsored by: TechTarget ComputerWeekly.com

    There is a lot of uncertainty in the world right now, and businesses might be forgiven for taking a cautious approach to their planning. But one thing is certain, and that is that oil-rich countries in the Middle East will continue to invest heavily in diversifying their economies.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.