ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=30"

  • Accelerate Growth and Improve Innovation

    Sponsored by: Amazon Web Services

    Discover how public sector organizations are using AI to drive innovation, improve applications, and optimize costs. Learn how AI can accelerate growth and enhance user experiences across industries. Read the full eBook to explore real-world success stories.

  • How Russia's war in Ukraine is changing the cybersecurity game and why that matters

    Sponsored by: TechTarget ComputerWeekly.com

    The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.

  • Containers and storage 101: The fundamentals of container storage

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at the basics of Docker storage and backup, key containers capabilities in storage vendors' offers and how containers can be incorporated into the private cloud environment.

  • CW Benelux - May-July 2022: Meta shelves hyperscale datacentre plan in Netherlands

    Sponsored by: TechTarget ComputerWeekly.com

    Meta's plan for a hyperscale datacentre in the Netherlands which was to serve the metaverse world has been halted following a campaign by environmentalists and the Dutch parliament's call for the government to do everything in its power to stop the facility being built. Read about it in this issue of CW Benelux.

  • MicroScope – December 2019: Time for change

    Sponsored by: MicroScope

    In this issue, we ask experts how they're approaching digital transformation to meet customers demand, and we look at whether the actions of the user should reflect on the accountability of the cloud provider

  • Build a Better Webinar: Running Virtual Events

    Sponsored by: BrightTALK by TechTarget

    Download Build a Better Webinar: Running Virtual Events,where you can discover BrightTALK's years of expertise executing for their clients to share foundationalvirtual event best practices. From determining the theme of your event to evaluating event performance,you'll walk away with a clear roadmap to build and execute a successful virtual event.

  • Making the Move to Modern IGA Expert Insights To Transition Your Legacy Identity Platform

    Sponsored by: Saviynt

    This guide shares expert advice on preparing for, executing, and measuring a modernization campaign’s success. Insights surround building consensus, evaluating platforms, managing migration, and measuring success. Importantly, it also features real-world examples from practitioners on the other side of successful transitions. Read the guide today!

  • Transforming Project Management With The Right Tools And Ways Of Working

    Sponsored by: Atlassian

    Discover how to transform project management with the right tools and ways of working. Learn to set up projects for success, plan team work, manage ongoing tasks, and assess performance - all within a unified Atlassian work management platform. Read the full e-book to learn more.

  • Navigating Disruption with Generative AI Strategies

    Sponsored by: Foundever

    Enterprises must adapt to evolving customer expectations and technology disruption. Generative AI offers strategic advantages to help modernize customer experience, optimize operations, and future-proof the business. Download this analyst report to learn how to leverage Generative AI for your CX transformation.

  • Computer Weekly – 26 September 2017: Building on legacy IT

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, experts at VMworld 2017 discussed how to adapt legacy IT to make the most of modern technology – we listened in. Artificial intelligence is touted as an aid to decision-making, but it needs to be handled with care. And we learn how Wales has become a hotspot for cyber security innovation. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.