ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=20"

  • Domain Name System (DNS) Security

    Sponsored by: Cisco

    SRM leaders must fully understand the FedRAMP program, its security levels, and the authorization process to make informed cloud security decisions. Verify CSP FedRAMP status and ask probing questions. Remember that using a FedRAMP-authorized cloud does not absolve security responsibilities. Read the full Gartner Research Report to learn more.

  • Collaboration software in the era of Gen-Z

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, learn how Microsoft is dominating the Software-as-a-Service space thanks to its strength in collaboration software and how the new generation of collaboration software could be stoking communication overload. Also, check out our chart comparing Slack, Microsoft Teams and Spark.

  • A hybrid approach: How the conversation around cloud is changing

    Sponsored by: TechTarget ComputerWeekly.com

    Enterprise cloud migrations used to be discussed in absolute terms.  In this e-guide, we take a look at how the conversation around cloud is changing within the enterprise, as migration habits and preferences are shaped by world events, resiliency and business agility concerns, as well as financial considerations.

  • Computer Weekly – 30 April 2024: What's it like being the IT chief at Man Utd?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we speak to the chief digital information officer of Manchester United Football Club to discuss the IT that keeps a premiership team running. We also investigate how well prepared the UK is for major semiconductor supply chain disruptions. Read the issue now.

  • CW ASEAN: Trend Watch – Security

    Sponsored by: TechTarget ComputerWeekly.com

    Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.

  • Top 10 Australian IT stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at how the country is harnessing cutting-edge technologies to solve problems, while paving the way for emerging areas such as open banking.

  • CW Benelux February 2018

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.

  • Cloud Market Report Australia

    Sponsored by: TechTarget ComputerWeekly.com

    What is the state of Australia's cloud market? Inside this market report, industry experts share their thoughts on how the key players measure up and find out how Bendigo Bank, Frisk, Pizza Hut, RMIT Online, Unit4 are maximising their cloud investments.

  • Royal Holloway: Protecting investors from cyber threats

    Sponsored by: TechTarget ComputerWeekly.com

    The cyber security of personal investors who use UK investment platforms to manage their pensions or savings is not well understood and not often discussed. In this Royal Holloway security article, we identify the principal cyber threats to investors' assets on UK investment platforms and what can be done to prevent or mitigate these threats.

  • CW Benelux February-April 2020: Ericsson helps driverless buses hit European streets

    Sponsored by: TechTarget ComputerWeekly.com

    Ericsson reveals its plans for new technologies including 5G, the internet of things and automation, including driverless buses.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.