ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=30"

  • CRM enters maturity as customer experience custodian

    Sponsored by: TechTarget ComputerWeekly.com

    CRM has a long lineage in enterprise software, starting with salesforce automation in the 1990s, Siebel being a big player back in the mists of time. These days, engaging with customers through every conceivable channel, and doing so by way of the cloud are the novelties of CRM.

  • Computer Weekly - 23 November 2021: Can the tech community show how to save the world?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we report from the COP26 conference on how the tech world's collaborative open source model could help tackle climate change. Gartner has urged IT leaders to rethink their role as business come to rely on digital technologies. And we ask if your office security is at risk as staff return. Read the issue now.

  • Personal branding in the digital age: How to become a known expert, thrive and make a difference in a connected world

    Sponsored by: TechTarget ComputerWeekly.com

    This chapter from Francine Beleyi's book Personal branding in the digital age, explains the seven key pillars you need to build a successful personal brand.

  • Computer Weekly - 1 December 2020: How retailers are using technology to survive

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, with high-street retailers struggling to survive, we look at how technology can keep stores relevant. Everyone is focusing on flash storage, but hard disk drives are still an essential part of the IT toolkit. And we examine the latest developments in the ongoing Post Office Horizon IT scandal. Read the issue now.

  • How the application integration landscape is changing

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we discover how the industry is trying to make it possible to link applications together in order to share resources with ease. We take a look at how technologies like Distributed Computing and the Common Object Model have been refined into web services, service-oriented architecture and composable applications and microservices.

  • State of GDPR in mainland Europe

    Sponsored by: TechTarget ComputerWeekly.com

    The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.

  • Decentralising datacentres: The new challenges of security at the edge

    Sponsored by: TechTarget ComputerWeekly.com

    In September 2020, the Computer Weekly Security Think Tank, our panel of information and cyber security experts, consideredthe challenges inherent in decentralising the datacentre, and set out to answer the question, how can security professionals ensure such setups are just as secure as the traditional centralised model? Read more in this e-guide.

  • CW APAC, April 2021: Trend Watch: IoT in India

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on the internet of things in India, Computer Weekly looks at the country's potential as an IoT hotspot.

  • Moving Your SAS 9 Estate to the Cloud: Five Questions to Guide Your Journey

    Sponsored by: SAS

    Today, the moment has come for tech leaders to reassess the current cloud landscape and incorporate emerging technologies into an evolved approach to cloud analytics.Download this white paper, which will serve you as a guide to the state of cloud analytics, equipping you with 5 key questions to guide your journey.

  • Simplify Cloud Security with Red Hat and AWS

    Sponsored by: Red Hat

    Secure your hybrid cloud with consistent security policies across Red Hat Enterprise Linux and AWS. Learn how to mitigate risks, implement layered security, and streamline compliance. Download this product overview to discover the integrated security capabilities.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.