ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=20"

  • CVE-2021-2035 and RDBMS Scheduler Security

    Sponsored by: Spinnaker Support

    This white paper analyzes CVE-2021-2035 in Oracle Database's Scheduler. It discusses the attack surface, needed privileges, and defense strategies like limiting scheduler access, setting up SQLNet, and encrypting credentials. Discover how to protect your Oracle Database by reading the complete paper.

  • Computer Weekly – 11 October 2016: Leadership bonus – analysing our UK salary survey

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our UK salary survey shows that IT leaders are benefiting from generous bonuses as tech becomes part of mainstream business. We find out how the internet of things is transforming the railway industry. And the CIO of the Williams F1 team explains how data analytics is boosting race performance. Read the issue now.

  • GEP Outlook 2024

    Sponsored by: GEP

    Recent years have had businesses struggling with a myriad of challenges, risks, and concerns, especially for procurement and supply chain leaders. So, how are companies transforming? What trends can you expect going into the new year and how can you best keep up? Browse the report to learn more.

  • European Perceptions, Preparedness and Strategies for IoT Security

    Sponsored by: TechTarget ComputerWeekly.com

    Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.

  • Evaluating the Pillars of Responsible AI

    Sponsored by: Hitachi Pentaho

    As AI's role expands, responsible AI practices become increasingly crucial. This Enterprise Strategy Group research report covers key pillars like bias, fairness, and transparency, and how to align innovation with ethical AI development. Read on now to learn how you can build an effective, responsible AI strategy for your organization.

  • Computer Weekly – 20 February 2024: Flying into cloud – EasyJet's journey out of the datacentre to AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how EasyJet fills an aircraft every 10 seconds while migrating to the cloud and introducing AI. There's only 283 years to go until we have a diverse IT workforce – we find out why. And we examine how the UK anti-trust investigation into the cloud market could hit the big hyperscalers. Read the issue now.

  • A Computer Weekly buyer's guide to digital customer experience

    Sponsored by: TechTarget ComputerWeekly.com

    The pandemic has brought on changes to how organisations and their customers interact. In this 15-page buyer's guide, Computer Weekly looks at why firms need to adapt, what customer and employee experience has in common and what companies are doing to update the digital customer experience.

  • Securing DevOps A Digital-first Imperative for Success

    Sponsored by: CyberArk

    This IDC InfoBrief commissioned by RedHat and CyberArk looks at the importance of securing identities as businesses embrace a DevOps culture in APAC. A full DevSecOps approach has many facets, and the starting point for a successful DevSecOps approach is around identity and access management controls.

  • CIO and leadership survey 2017

    Sponsored by: TechTarget ComputerWeekly.com

    This survey of 80 CIOs and IT leaders by Coeus Consulting shows the technology and financial trends facing IT leaders and businesses.

  • Finding Value In Analyst Estimates For Value Investors

    Sponsored by: S&P Global

    Visible Alpha's data science team analyzes how sell-side analyst expectations of return on equity and return on assets correlate with future stock returns. Dig into this report to learn why the value factor has underperformed and how to improve systematic value strategies.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.