ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=20"

  • Register to Learn More about the HPE CloudPhysics Assessment

    Sponsored by: Hewlett Packard Enterprise

    As a business, achieving competitive success is near impossible without maximizing the value of your data. And now, with data-intensive workloads such as AI poised to transform modern business even further, the traditional, siloed approach to data storage is becoming unsustainable.

  • The technological evolution of IT industry leaders: Part two

    Sponsored by: TechTarget ComputerWeekly.com

    Companies leading the technological evolution have gone through changes. This second part of this e-guide explores the technological evolution of SAP, Microsoft and some business analytics vendors throughout the past two decades.

  • 5 Essential Steps to SOC Transformation

    Sponsored by: Palo Alto Networks

    Explore 5 essential steps to transform your security operations center (SOC) and elevate it with automation and AI capabilities designed for the modern threat landscape. Learn how to modernize your SOC to better detect, investigate, and respond to today's sophisticated cyberattacks. Read the full white paper.

  • Discovering new levels of agility with hybrid-cloud self-service and DevOps automation.

    Sponsored by: Morpheus Data

    In an industry where speed is everything, growing technology bottlenecks can hold you back. In this case study, learn how AstraZeneca adopted cloud automation technology, updated their provisioning, and improved compliance with the help of Morpheus Data. Read the study here.

  • Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.

  • CW APAC: Expert Advice on data management

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how companies and data management experts are tackling data challenges, and finds out how organisations are augmenting data management through artificial intelligence and machine learning.

  • Computer Weekly – 31 May 2022: Trial and error – why the law on computer evidence must change

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the Post Office IT scandal highlighted the problem with computer evidence – we examine the need for legal reform. We assess the nuclear option for sustainable datacentre power. And we find out how IT experts can improve their soft skills and boost their career prospects as a result. Read the issue now.

  • The evolution of the agile organisation

    Sponsored by: TechTarget ComputerWeekly.com

    This research by PA Consulting finds that organisations can improve their financial performance as a result of adopting agile techniques.

  • Quarterly Ransomware Report Q1 2024

    Sponsored by: CyberMaxx

    To learn about trends in ransomware in Q1 2024, and to unlock predictions about ransomware in 2024, tap into this 6-page research report by CyberMaxx.

  • CIO Trends #11: Benelux

    Sponsored by: TechTarget ComputerWeekly.com

    The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.