ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=20"

  • Artificial intelligence, for real

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide features some of our coverage of AI: showing it realised for business benefit, interacting with the containerisation trend and cyber-security and cogitated upon with scholarly seriousness.

  • Computer Weekly – 18 August 2020: How Covid-19 elevated the datacentre

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how datacentres and their workers became part of our critical national infrastructure due to the pandemic. Firms considering upgrading to SAP S/4 Hana face hefty bills – we look at how to keep costs down. And we analyse the increasing rate of applications being migrated to the cloud. Read the issue now.

  • Computer Weekly – 18 August 2020: How Covid-19 elevated the datacentre

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how datacentres and their workers became part of our critical national infrastructure due to the pandemic. Firms considering upgrading to SAP S/4 Hana face hefty bills – we look at how to keep costs down. And we analyse the increasing rate of applications being migrated to the cloud. Read the issue now.

  • Royal Holloway: Driverless vehicle security for military applications

    Sponsored by: TechTarget ComputerWeekly.com

    Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.

  • Prioritizing 5G for Healthcare SMBs

    Sponsored by: T-Mobile for Business

    One out of four healthcare SMBs said that 5G is a top 3 technology and health IT initiative that will impact healthcare over the next five years. Planning and investing in 5G will provide many benefits to the healthcare industry, but 5G comes with challenges that can be carefully navigated with the right partners.

  • Preventing identity theft in a data breach

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.

  • CW Middle East ezine July 2018

    Sponsored by: TechTarget ComputerWeekly.com

    What more does a region need to be recognised as a technology leader than its very own valley, of the silicon variety? Where once only oil flowed down Saudi Arabia's economic valleys, tech has now taken a grip. Read in this issue about the country's ambitions in the tech sector.

  • Comprehensive Guide To Security Operations

    Sponsored by: Arctic Wolf

    Despite sizeable budgets and an array of technology solutions at their disposal, most security teams can barely keep up with the bombardment of threats targeting IT environments as the attack surface continues to expand. Access this guide to learn a pragmatic approach to reducing the risk and impact of an attack and improving security resiliency.

  • Proving ownership of IPv6 addresses

    Sponsored by: TechTarget ComputerWeekly.com

    In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.

  • Designing a Comprehensive Intent Data Strategy

    Sponsored by: TechTarget

    Teams relying only on traditional inward-focused insight sources are at a widening disadvantage as B2B buyer preference for self-directed solution research has already begun reducing the chances today’s vendor teams have to break through. Designing a comprehensive intent data strategy can help you avoid challenges. Learn how in this e-book.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.