Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
10 steps to building a data catalog
Sponsored by: TechTarget ComputerWeekly.comBuilding a data catalog is an important initiative for many IT and data management teams. But organizations shouldn't undertake a data catalog project without getting input from business users. In this e-guide, learn why data catalogs have become a core component of the data management environment, and the 10 steps to build a data catalog.
-
White Paper Transform your IT with AWS
Sponsored by: T-SystemsMany cloud migrations fail not because of technology, but rather because of established business processes or the corporate culture. The goal of a cloud migration should not be transforming your technology, but rather transforming the business. Read on to learn about best practices you can leverage to successfully tackle your cloud migration.
-
Computer Weekly â 18 June 2019: Applying AI to road safety
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we visit a Tokyo project where artificial intelligence is helping to improve road safety by detecting potential subsidence. As bug bounty programmes become popular, we look at what's involved and the pitfalls to beware. And we discuss digital development in healthcare with NHS England. Read the issue now.
-
5 Essential Steps to Enhancing Interactions with Conversational AI
Sponsored by: Boost.aiThis eBook outlines 5 essential steps to successfully automating customer relationships with conversational AI. Learn how to identify use cases, select the right technology, and implement a winning strategy. Read the full white paper to transform your customer experience with AI.
-
Data Warehouse Automation in Azure
Sponsored by: QlikIn this 46-page For Dummies e-book, you'll learn about the benefits of cloud data warehousing, including scalability, security, and real-time analytics. Read on now to find out how you can build an agile data pipeline and accelerate time to value.
-
How To Set Up An HR Function: The Essential Guide And Checklist
Sponsored by: SageThis comprehensive guide walks through the essential steps to set up an effective HR function, from defining your business objectives to establishing policies and performance management. Download the e-book to learn how to build a people-focused strategy that supports your company's growth.
-
A Computer Weekly buyer's guide to big data architecture
Sponsored by: TechTarget ComputerWeekly.comBig data architecture is increasingly proving its worth in business. In this 14-page buyer's guide, Computer Weekly looks at the storage needs that come with artificial intelligence, how to get the most out of data and what it can do to enhance a company's performance.
-
Stop breaches with privileged access security white paper
Sponsored by: One IdentityToday's privileged access security is critical to protect digital resources and users. Learn how to implement a modern identity security strategy, including Zero Trust principles, to reduce cyber risks. Read the white paper for more insights.
-
CW Middle East January-March 2020: Digital leads the way at Abu Dhabi oil giant
Sponsored by: TechTarget ComputerWeekly.comIn this issue of CW Middle East, read how the UAE and the Abu Dhabi National Oil Company have recognised that things will change as oil and gas resources dwindle. Digital technology, such as artificial intelligence, has been identified as a key driver for future industries.
-
Cyber Help (And Hope) For K-12 Targets
Sponsored by: SonicWallBecause Kâ12 systems usually employ fewer cybersecurity experts than other industries, they are a prime target for cybercriminals. So, how can Kâ12 environments improve security? For guidance, check out this 8-page white paper.