ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=30"

  • CW Europe December 2019: Deutsche Bank creates innovation division

    Sponsored by: TechTarget ComputerWeekly.com

    German investment banking giant Deutsche Bank is opening a division focused on innovation as part of its plan to digitise all business operations. Read more details in this edition of CW Europe.

  • MicroScope – February 2022: Spotting the hidden security dangers

    Sponsored by: MicroScope

    In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate

  • A Computer Weekly Buyers Guide to 5G

    Sponsored by: TechTarget ComputerWeekly.com

    Despite the fears of many that rollouts of the next generation infrastructure would be delayed or just not be possible due mainly to the adverse economic conditions caused by Covid-19, the prospects are actually quite bright for the 5G industry in 2021.

  • Computer Weekly – 19 July 2016

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.

  • Verizon ABM with Intent: Front Line Success at Scale

    Sponsored by: TechTarget

    Dive into this case study to examine how Verizon Business Group, a division within one of the world’s largest telecoms firms, for a strong example of how a team has implemented ABM concepts at scale to realize broad benefits across many business areas.

  • Domain Name System (DNS) Security

    Sponsored by: Cisco

    SRM leaders must fully understand the FedRAMP program, its security levels, and the authorization process to make informed cloud security decisions. Verify CSP FedRAMP status and ask probing questions. Remember that using a FedRAMP-authorized cloud does not absolve security responsibilities. Read the full Gartner Research Report to learn more.

  • CW ASEAN: SD-WAN helps find best route to cloud

    Sponsored by: TechTarget ComputerWeekly.com

    This year, more enterprises will adopt a "cloud-first" SD-WAN architecture designed to efficiently support their increasingly cloud-based application mix. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises gearing up for this eventuality.

  • Navigate the era of new customer expectations

    Sponsored by: ServiceNow

    For companies to be successful, they must achieve the delicate balance of finding ways to reduce costs while still delivering seamless customer experiences that stand out versus the competition. Today, focusing solely on customer engagement is not enough. Customers also want easy problem-solving with minimal effort. Read on to see how to offer it.

  • Computer Weekly – 27 March 2018: The desktop is changing

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, corporate PCs haven't changed much in 20 years – as use of Chrome OS grows, we ask if IT leaders are ready for a new approach. Theresa May said Brexit means the UK leaving the EU digital single market – does this mean a return to roaming charges? And we look at the latest developments in Linux. Read the issue now.

  • Nordic banking in the digital age

    Sponsored by: TechTarget ComputerWeekly.com

    Read in this e-guide how Nordic banks are working together to make cross border payments in the region seamless. Also find out how Nordic banks are offering customers the opportunity to make payments via wearable devices and how the region's successful mobile payments platform, MobilePay, is futureproofing its business.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.