ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=30"

  • The Definitive Guide to AI Platforms for Open-Source Data Science and ML

    Sponsored by: Anaconda

    This comprehensive white paper explores top open-source AI tools and use cases across industries. Inside, you'll learn how to empower your teams to build, deploy, and maintain secure AI solutions. Download now to discover strategic approaches to leverage AI for competitive advantage.

  • Consolidate to Innovate

    Sponsored by: Asana

    Streamline your tech stack to boost productivity and efficiency. Learn how to consolidate apps, optimize workflows, and leverage emerging tech like AI and blockchain. Download this e-book to transform your digital workspace.

  • Computer Weekly – 20 September 2022: A gold medal performance for networking

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the IT team behind the 2022 Commonwealth Games in Birmingham delivered a winning performance, how the centuries-old London insurance market is going digital, thanks to Lloyd's of London, and how low-cost high street stores succumbed to the inevitable and are going online. Read the issue now.

  • How open source is spurring digital transformation

    Sponsored by: TechTarget ComputerWeekly.com

    From Linux to Kubernetes, open source has been key to efforts by organisations across APAC to transform digitally. In this e-guide, read how Malaysia's AmBank is using open source to engineer its software from the ground-up, ANZ Bank's move to Red Hat OpenShift, and what suppliers are doing to support deployments of containerised applications.

  • Computer Weekly - 23 March 2021: Would the UK really nuke a cyber attacker?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, did the UK's defence and security review really suggest a nuclear response to a cyber attack? Data visualisation has been widely used to explain the Covid-19 pandemic, but not always that effectively. And jewellery retailer Pandora explains how it kept the personal touch as customers went online. Read the issue now.

  • CW Middle East July to Sept 2016

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of CW Middle East we look at how CIOs in the region are formulating their virtualisation strategies as organisations warm to the benefits of cloud computing.

  • Identity Governance & Administration Solution Buyer’s Guide

    Sponsored by: Saviynt

    Over the last few years, cloud acceleration, security threats, and constant technology transformation have bombarded enterprises. IGA is fundamental to modern enterprise security. Importantly, IGA builds a foundation for Zero Trust across cloud, hybrid, and on-prem environments. Read on to learn more.

  • 10 ways to optimize costs and innovate with AWS

    Sponsored by: AWS

    Discover 10 ways AWS helps you optimize costs and accelerate innovation. Migrate workloads, optimize Windows applications, and leverage AWS machine learning accelerators - all to boost performance and savings. Read the infographic to learn more.

  • Royal Holloway: Information security of the 2016 Philippine automated elections

    Sponsored by: TechTarget ComputerWeekly.com

    We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.

  • Escaping legacy – removing a major roadblock to a digital future

    Sponsored by: TechTarget ComputerWeekly.com

    Core legacy systems inhibit businesses' ability to meet changing customer demands in the digital age. The scale and nature of the problem is such that it needs to be addressed now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.