ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=20start=20start=20"

  • Royal Holloway: Driverless vehicle security for military applications

    Sponsored by: TechTarget ComputerWeekly.com

    Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.

  • Focus: Private cloud

    Sponsored by: TechTarget ComputerWeekly.com

    The private cloud is often viewed as a stepping stone for enterprises keen to tap into the business agility benefits of cloud without ceding total control over where their applications and workloads run. For some organisations, such deployments act as a test bed environment, where they can work out where best to run their workloads.

  • Computer Weekly - 21 September 2021: The cities planning for ethical use of AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to tech leaders in Barcelona and London about a collaboration to ensure ethical use of AI in the era of smart cities. The UK government wants to reform data protection law – we assess the implications. And we examine the latest best practice in hybrid cloud. Read the issue now.

  • The ultimate guide to Robotic Process Automation (RPA)

    Sponsored by: TechTarget ComputerWeekly.com

    Robotic process automation is a hot commodity in today's enterprises -- its impact has been described as transformational and disruptive. Still, RPA software is not without risks. In this e-guide, we explain everything you need to know for a successful RPA implementation, from the basics to analysis of where this rapidly evolving market is headed.

  • Mastering Recruitment Metrics An In-Depth Guide

    Sponsored by: GEM

    Discover how to leverage recruitment metrics to transform recruiters into talent acquisition authorities, debug hiring funnels, forecast progress, and demonstrate recruiting's impact on the business. Download the in-depth guide to learn more.

  • Trouble at your door: targeted cyber attacks in the UK and Europe

    Sponsored by: TechTarget ComputerWeekly.com

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • RSA Conference 2020 guide: Highlighting security's human element

    Sponsored by: TechTarget ComputerWeekly.com

    The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.

  • Supply chain management balance shifts from efficiency to resilience under Covid

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide explores these matters, beginning with a comprehensive article that ranges over supply chain management, from a macro level through how trading platforms have been flexed to switch suppliers rapidly down to how robots have been quickly deployed to solve problems of scale.

  • Security analytics: Enabling organisations to get ahead of attackers

    Sponsored by: TechTarget ComputerWeekly.com

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

  • 10 Steps to Enhance the Agility, Security and Performance of Active Directory

    Sponsored by: One Identity

    Microsoft Active Directory (AD) and Azure AD (AAD) bring organization and standards to how identity and account data is managed and stored. One Identity Active Roles unifies your AD and AAD environments and enables identity and account data to be managed with agility, security and speed. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.