Search Results for "Juniper Researchstart=20start=20start=30start=20start=30"
-
CW Nordics May-July 2020: Startups face tough decisions as coronavirus fallout hits
Sponsored by: TechTarget ComputerWeekly.comTech startups based in the Nordic region face difficult decisions as the Covid-19 pandemic leads to falling sales and investment.
-
Gamma International: The Macedonia files
Sponsored by: TechTarget ComputerWeekly.comThis PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
-
Security Threats for Apps “In the Wild”
Sponsored by: Digital.aiDownload this study to learn how security professionals can safeguard their apps and users from malicious activities by illuminating and quantifying the threats to applications in the wild.
-
CW Middle East July to Sept 2016
Sponsored by: TechTarget ComputerWeekly.comIn this issue of CW Middle East we look at how CIOs in the region are formulating their virtualisation strategies as organisations warm to the benefits of cloud computing.
-
Computer Weekly – 5 October 2021: The most influential women in UK technology
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we reveal the 50 women chosen as the most influential in UK technology for 2021, and talk to the 10th winner of our annual list – Poppy Gustafsson, CEO of Darktrace. Also, our latest buyer's guide looks at digital customer experience technologies. Read the issue now.
-
IT Asset Management Optimize Expanding Technologies and Enterprise Asset Holding
Sponsored by: ServiceNowSmarter approaches to asset management addresses the hidden asset cost gotchas; download this Gorilla Guide e-book to find out how.
-
Quarterly Ransomware Research Report
Sponsored by: CyberMaxxThis Q3 2024 ransomware report analyzes the latest trends, including a 2% decrease in attacks compared to Q2 and the rise of the Ransomhub group. The average cost of a data breach continues to grow, highlighting the need for robust security. Read the full report to stay informed on the evolving ransomware landscape.
-
CW ASEAN: Defend against disruption
Sponsored by: TechTarget ComputerWeekly.comIn this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.
-
Benelux: New skills in a digital world
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we look at some of the technologies being adopted in the Benelux region. This gives a taste of what is in demand. Read about how Dutch organisations and the Netherlands in general are witnessing the rise of technologies like virtual reality, no-code programming platforms, smart neighbourhood, as well as fintech.
-
GEP Spend Category Outlook 2024
Sponsored by: GEPAs it’s clear that the challenges plaguing the supply chain will not be going away any time soon, procurement must come up with ways that they can leverage new technology to combat these issues. But of these tools, which are the most effective? Browse this report to learn more.