ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=30"

  • CW EMEA July 2023: Can we trust AI?

    Sponsored by: TechTarget ComputerWeekly.com

    Artificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public.

  • UKI 2022 Salary Survey Results

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: We take a look at our 2022 Salary Survey results from over 250 respondents who work in the UKI IT sector. We will be breaking down which job functions get paid what, what areas of IT companies will be investing in in 2022 and the current diversity landscape residing in the UK tech sector.

  • CW APAC, Sep 2021: Buyer's guide to robotic process automation

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at the adoption of robotic process automation in APAC and where the technology fits in the wider automation landscape

  • Computer Weekly – 31 July 2018: Learning digital government lessons from Estonia

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at one of the world's most digitally advanced nations, Estonia, and ask what the UK government can learn. We talk to Airbus about how aircraft manufacturers are prioritising cyber security. And we examine how AI and robots will augment – not replace – human productivity. Read the issue now.

  • Getting started with Azure Red Hat OpenShift

    Sponsored by: Red Hat

    As the network perimeter is now everywhere and anywhere users are, security must move with it and needs to be in place at the point of access. Download this e-book to learn how you can secure remote access and build user trust.

  • Computer Weekly – 30 January 2024: Tech companies warn EU over encryption plans

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, tech companies are calling on the European Commission to rethink plans to weaken internet encryption – we explore the issues. We talk to credit rating agency Moody's about why it thinks now is the time to invest in quantum computing. Read the issue now.

  • Welcome to the new world of network management

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we will explore how the role of the network manager is undergoing radical change as the world of networking moves into the cloud with the transition towards software-defined, virtualised infrastructures and begins to incorporate elements of automation and machine learning.

  • Who will win the world's biggest cloud contract?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.

  • CW APAC: Buyer's guide to SASE

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.

  • Business Analytics: how AI is augmenting analysis, and bolstering data literacy shortfalls

    Sponsored by: TechTarget ComputerWeekly.com

    Artificial Intelligence and human analysis have been coming together in recent years. Whether using packaged BI and data preparation tools, or languages like Python and R, business analysts and data scientists and engineers alike have been exploring the use of machine learning algorithms to augment their data analyses. Read more in this e-guide.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.