ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=20"

  • December ezine: Tech for good

    Sponsored by: MicroScope

    Read about why more CEOs are discussing the positives of technology and why the channel will need to do the same

  • Nordics are leading the datacentre revolution

    Sponsored by: TechTarget ComputerWeekly.com

    The Nordic region has space, access to renewable energy, a cool climate and a well-educated workforce. All these things make it a great place to build a datacentre. Read in this e-guide how the Nordic region is leading the datacentre revolution.

  • CW ASEAN – December 2018: How to make the right cloud infrastructure choices

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's edition of CW ASEAN, we take a look at the considerations when choosing infrastructure as a service, and what needs to be in place for enterprises to get the most out of the cloud computing technology

  • INNOVATION How SF6 Alternatives And Digital Technologies Combine To Empower Electricity Decarbonization And Efficiency

    Sponsored by: Schneider Electric

    Read this 22-page e-book to understand how the combination of removing the sulfur hexafluoride greenhouse gas (SF6) from networks and the deployment of connected digital technologies can help you make meaningful progress toward electricity decarbonization and efficiency.

  • CW Europe – September 2018: Costs stack up for Dutch government IT projects

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of CW Europe, we look at analysis by a Dutch newspaper which discovered that government-controlled IT projects in the Netherlands go over budget by 40%, on average. We also find out how Berlin's Digital Career Institute is building web skills among refugees and the unemployed across Germany.

  • The Essential Guide to XDR

    Sponsored by: Palo Alto Networks

    Extended detection and response (XDR) is one of the main solutions cybersecurity professionals have turned to deal with the rise in cyberthreats. Read on for a comprehensive breakdown of XDR, what it is, how it works, and what you can do to get the most out of your XDR tools.

  • MicroScope – September 2020: Reach out to resellers

    Sponsored by: MicroScope

    In this issue, discover how the channel is making sure the human touch is maintained during the pandemic, with insight into how closer bonds can be developed and on how to maintain productivity. Also read about 'hybrid working' is set to shape the future of the workplace

  • Guide to business continuity planning during COVID-19

    Sponsored by: TechTarget ComputerWeekly.com

    As COVID-19 continues to spread, companies need to evaluate their ability to conduct business as usual during this time. Inside this comprehensive guide, we share best practices on how to defend your business against disruption, identify key business areas at risk and respond to business continuity planning challenges.

  • What is generative AI? Everything you need to know

    Sponsored by: Dell Technologies & AMD

    In this comprehensive e-guide, you'll gain an understanding of the inner workings of gen AI, including a look at some of the most popular interfaces as well as key use cases. It also includes gen AI FAQs, potential concerns, and ethical considerations. Read on to learn how you can navigate your gen AI journey.

  • How Citrix Leverages Intent & Multi-Layered Engagement to Innovate in Its ABM Programs

    Sponsored by: TechTarget

    In this e-book, global digital workspace leader Citrix shares how it is winning with strategies that identify, influence and deliver opportunities from existing and net-new ABM accounts. Download your copy to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.