ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=30"

  • CW Nordics May-July 2020: Startups face tough decisions as coronavirus fallout hits

    Sponsored by: TechTarget ComputerWeekly.com

    Tech startups based in the Nordic region face difficult decisions as the Covid-19 pandemic leads to falling sales and investment.

  • Gamma International: The Macedonia files

    Sponsored by: TechTarget ComputerWeekly.com

    This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.

  • Security Threats for Apps “In the Wild”

    Sponsored by: Digital.ai

    Download this study to learn how security professionals can safeguard their apps and users from malicious activities by illuminating and quantifying the threats to applications in the wild.

  • CW Middle East July to Sept 2016

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of CW Middle East we look at how CIOs in the region are formulating their virtualisation strategies as organisations warm to the benefits of cloud computing.

  • Computer Weekly – 5 October 2021: The most influential women in UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal the 50 women chosen as the most influential in UK technology for 2021, and talk to the 10th winner of our annual list – Poppy Gustafsson, CEO of Darktrace. Also, our latest buyer's guide looks at digital customer experience technologies. Read the issue now.

  • IT Asset Management Optimize Expanding Technologies and Enterprise Asset Holding

    Sponsored by: ServiceNow

    Smarter approaches to asset management addresses the hidden asset cost gotchas; download this Gorilla Guide e-book to find out how.

  • Quarterly Ransomware Research Report

    Sponsored by: CyberMaxx

    This Q3 2024 ransomware report analyzes the latest trends, including a 2% decrease in attacks compared to Q2 and the rise of the Ransomhub group. The average cost of a data breach continues to grow, highlighting the need for robust security. Read the full report to stay informed on the evolving ransomware landscape.

  • CW ASEAN: Defend against disruption

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.

  • Benelux: New skills in a digital world

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at some of the technologies being adopted in the Benelux region. This gives a taste of what is in demand. Read about how Dutch organisations and the Netherlands in general are witnessing the rise of technologies like virtual reality, no-code programming platforms, smart neighbourhood, as well as fintech.

  • GEP Spend Category Outlook 2024

    Sponsored by: GEP

    As it’s clear that the challenges plaguing the supply chain will not be going away any time soon, procurement must come up with ways that they can leverage new technology to combat these issues. But of these tools, which are the most effective? Browse this report to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.