ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=20"

  • A Computer Weekly buyer's guide to the circular economy

    Sponsored by: TechTarget ComputerWeekly.com

    Increasing environmental concerns have made companies consider the circular economy model. In this 17page buyer's guide, Computer Weekly looks at how organisations can become more sustainable, whether Amazon's server pledge will catch on and how CIOs can adapt their procurement strategies to fight climate change.

  • Top 10 enterprise IT in the Benelux region stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    The Netherlands is usually seen as a forward-thinking nation when it comes to developing and adopting the latest IT, but it seems its government is not doing particularly well in this respect. Here are Computer Weekly's top enterprise IT in the Benelux region stories of 2019.

  • CW Middle East July-Sept 2019: SAP project drives digital transformation for Saudi Arabia's largest auto company

    Sponsored by: TechTarget ComputerWeekly.com

    It's not just the countries of the Middle East that have a plan when it comes to digital transformation. Private businesses are also overhauling their systems. One such company is the automotive division of Saudi Arabia's Abdul Latif Jameel Company (ALJC), which has completed one of the biggest SAP projects ever undertaken in the auto sector.

  • Hybrid cloud: What enterprises need to know today

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a look at some of the latest thinking and trends around hybrid cloud, and shine a light on some of the enterprises who are favouring this IT infrastructure approach.

  • Computer Weekly – 13 August 2024: Designed to deceive – reviewing the Post Office scandal inquiry

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we review the marathon latest phase of the Post Office scandal inquiry, as ministers, civil servants, executives and lawyers were shamed. We look at IOWN – a candidate for the next generation of networking technology. And we examine best practice in software asset management. Read the issue now.

  • The Future of Manufacturing with Generative AI

    Sponsored by: Amazon Web Services

    Discover how Amazon Web Services (AWS) can help your industrial organization harness the transformative power of generative artificial intelligence (AI)

  • Top 10 IT careers and skills stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Digital skills are becoming increasingly important for day-today living, as well as for navigating the world of work. With digital and technology becoming a part of every company, it is important that all citizens in the UK have at least a basic level of digital competence. Here are Computer Weekly's top 10 IT careers and skills stories of 2019.

  • MicroScope E-Zine: January 2017

    Sponsored by: MicroScope

    Is the year ahead a bright one for channel? In this January 2017 edition of MicroScope E-zine, uncover the key expectations for channel in 2017.

  • Anatomy Of Identity Based Attacks

    Sponsored by: Okta

    74% of all breaches involve some form of human factor, whether it be error, credential theft, or social engineering. This white paper looks at the growing threats impacting organizations today, and how Okta can play a role in threat protection, detection, and response, before, during, and after the point of authentication.Read on to learn more.

  • Object Storage Systems in Demand for Big Data, Archiving

    Sponsored by: Cleversafe

    In this guide, Ellen O'Brien – the Executive Editor for SearchStorage.com – discusses how object storage is in high-demand for archiving and analyzing big data. Discover how metadata capabilities are propelling object storage beyond cloud storage and into a number of new and exciting use cases.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.