ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=20"

  • Why you should have a disaster recovery testing plan in place

    Sponsored by: TechTarget ComputerWeekly.com

    With this guide, gain a better understanding of why a disaster recovery testing plan is important, how to efficiently conduct tests, and some tools and terms that you will encounter along the way.

  • How To Simplify The Complexity Of The Educational Campus

    Sponsored by: TeamViewer

    Today’s campus is a vast ecosystem where an endless array of individuals, from students and faculty to administrative staff and visitors, must effectively coexist.

  • A 7-Step Risk Assessment Framework For Cybersecurity Professionals

    Sponsored by: VikingCloud

    Cybersecurity threats are on the rise, with 78% more breaches in the U.S. in 2023. This white paper outlines a 7-step risk assessment framework to help cybersecurity professionals identify critical assets, assess vulnerabilities, mitigate risks, and build cyber resilience. Read the full white paper to learn more.

  • How SMEs Can Break Free of AD’s Limitations Without Ditching AD

    Sponsored by: JumpCloud

    Discover how SMEs can modernize Active Directory without ripping and replacing it. This e-book explores the limitations of AD and Azure AD, and how to integrate a cloud-based directory platform to gain flexibility, security, and the freedom to adapt. Read the full e-book to learn more.

  • Finding Value 
 in Complex Cloud Deployments

    Sponsored by: Emma Technologies

    Explore the challenges of managing complex cloud deployments and discover how to streamline operations and maximize value. Learn how a unified cloud management platform can help your enterprise navigate the new frontier of enterprise technology. Read the full white paper.

  • Passkeys Primer

    Sponsored by: Okta

    Synced passkeys are a significant step towards a passwordless world, offering increased security and convenience over traditional passwords. Learn how passkeys work and explore different implementation approaches in this comprehensive white paper.

  • Computer Weekly - 8 June 2021: The jobseekers turning to cyber crime in the pandemic

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, security researchers say that people left unemployed by the pandemic are turning to cyber crime – we find out why. We examine the confluence of distributed cloud and edge computing technologies. And controversial uses of facial recognition technology come under further scrutiny. Read the issue now.

  • Computer Weekly – 4 July 2017: Be better connected in a wireless world

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the latest developments in wireless technology and how to deliver secure and reliable wireless networks. We examine Microsoft's PowerShell scripting language to understand why it's such an important tool. And we ask CIOs what it's like to cross the divide and work for IT suppliers. Read the issue now.

  • AI tools for software developers: Part One

    Sponsored by: TechTarget ComputerWeekly.com

    The Computer Weekly Developer Network is in the engine room, covered in grease and looking for Artificial Intelligence (AI) tools for software application developers to use. With so much AI power in development and so many new neural network brains to build for our applications, how should programmers 'kit out' their AI toolbox?

  • The AI Philosophy Powering Digital Resilience

    Sponsored by: Splunk

    As organizations embrace dispersed architecture, grapple with an evolving threat landscape and rely on digital systems, AI steps in as a promising solution to control IT chaos. Delve into 3 strategies that form Splunk’s AI philosophy and learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.