ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=20"

  • CRM enters maturity as customer experience custodian

    Sponsored by: TechTarget ComputerWeekly.com

    CRM has a long lineage in enterprise software, starting with salesforce automation in the 1990s, Siebel being a big player back in the mists of time. These days, engaging with customers through every conceivable channel, and doing so by way of the cloud are the novelties of CRM.

  • Computer Weekly – 28 February 2023: The race to net zero

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the role of green tech in helping businesses contribute to the government's 2050 net-zero targets. We also talk to Spotify about the importance of open source for the music streaming service and how hybrid working is evolving as the post-pandemic workplace continues to change. Read the issue now.

  • Responsible AI in Practice

    Sponsored by: Teradata

    Despite the importance of ethics, it is only one component of responsible AI. Responsible AI is a strategy for executing ethical AI while maintaining accountability, compliance, and governance to enable great customer experiences and drive growth for your business. Read on to learn how you can put it into practice.

  • Computer Weekly: The Most Influential People in UK IT

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal the 7th annual UKtech50 – our list of the 50 most influential people in UK IT. And we talk to this year's winner, ARM CEO Simon Segars, about the prospects for the UK tech sector after the uncertainty caused by the Brexit referendum vote. Read the issue now.

  • CW ASEAN, November 2018: Blockchain is no 'magic wand' for security

    Sponsored by: TechTarget ComputerWeekly.com

    Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.

  • Future Proofing with Trusted AI

    Sponsored by: OpenText

    Explore how trusted AI practices can help organizations harness the full potential of AI while mitigating cybersecurity risks. Learn about enhancing trust through data security, access control, and application security measures. Download the white paper to discover strategies for future-proofing your AI investments.

  • February ezine: Look to the future

    Sponsored by: MicroScope

    An issue with plenty of predictions about what the year ahead holds for the channel

  • Computer Weekly – 7 November 2023: How ExxonMobil is leading with data

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the leader of ExxonMobil's data organisation, about the energy giant's strategy to establish enterprise-wide principles for the use of data. As the UK's Online Safety Act comes into force, we examine the tech sector's concerns over the laws around end-to-end encryption. Read the issue now.

  • How server virtualisation is evolving to cloud native environments

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we discover how, in recent years, server virtualisation has given businesses the ability to abstract applications and the operating system from the underlying hardware. We explore how server virtualisation is gradually evolving towards cloud native environments.

  • Cloud Migration: How to do so safely and securely

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a closer look at what enterprises need to consider before pressing play on their cloud migration plans. Not only to ensure their move to the off-premise world goes as smoothly as possible, but also to make sure it brings the maximum amount of benefit to their business.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.