ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=30"

  • Computer Weekly - 27 October 2020: Pet project: How Pets at Home cares for customers with data analytics

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the chief data officer of Pets at Home, about using data analytics to care for customers. British Airways had its GDPR fine reduced to just £20m – we ask what this means for data protection regulation. And we look at GPT3, the language prediction tool that could revolutionise AI. Read the issue now.

  • 3 Steps to Calculate Total Enterprise IT Energy Consumption Using DCIM

    Sponsored by: Schneider Electric

    Download this white paper for a straightforward, “how to get started” guide that identifies the fundamental data points to start with and gives a simple 3-step framework to start measuring the environmental impact of the IT estate.

  • 3 Steps to Calculate Total Enterprise IT Energy Consumption Using DCIM

    Sponsored by: Schneider Electric

    Download this white paper for a straightforward, “how to get started” guide that identifies the fundamental data points to start with and gives a simple 3-step framework to start measuring the environmental impact of the IT estate.

  • Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers

    Sponsored by: TechTarget ComputerWeekly.com

    In this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act

  • CrowdStrike outage explained: What happened and what can we learn?

    Sponsored by: TechTarget ComputerWeekly.com

    A botched content update released by CrowdStrike in July 2024 led to a massive IT outage affecting about 8.5 million Windows systems worldwide. In this e-guide, learn more about how the outage occurred, its impact on organisations around the globe, and what you can do to mitigate the risks of similar incidents in future.

  • A Computer Weekly buyer's guide to applications of next-generation networking

    Sponsored by: TechTarget ComputerWeekly.com

    The race is on for businesses to adopt next-generation networking to stay ahead of their rivals. In this 14-page buyer's guide, Computer Weekly looks at how close we are to software-controlled networks becoming commonplace, assesses the current state of software-defined networking and explores the challenges a software-defined future poses

  • A Computer Weekly buyer's guide to SIEM and SOAR

    Sponsored by: TechTarget ComputerWeekly.com

    The question of how to use data has big implications on a company's performance. In this 16-page buyer's guide, Computer Weekly looks at how SIEM and SOAR tools assist IT teams, why security tools require strong internal security processes to work effectively and what role they have in a rapidly changing cyber threat landscape.

  • Redjack for Cyber Resilience Evidence-based proof for holistic planning

    Sponsored by: Redjack

    Cyber resilience is essential for business continuity and rapid recovery. The Redjack platform offers visibility into assets, identifies critical functions and dependencies, and assigns resilience and criticality scores to prioritize security efforts. Read the full white paper to learn how Redjack can help build effective cyber resilience.

  • MicroScope - December 2021: Valuing the MSP

    Sponsored by: MicroScope

    In this month's MicroScope, we look at why customers should be prepared to pay for the value offered by a managed service provider, identify the biggest drivers in the data storage market, and look at why some firms are struggling to get to grips with remote working. Read the issue now.

  • CIO Trends #10: Benelux

    Sponsored by: TechTarget ComputerWeekly.com

    If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes is a big one. Also find out how close autonomous ships are to regularly docking in Dutch ports. Read more about it in this issue of our CIO Trends Benelux series.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.