ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • 10 steps to building a data catalog

    Sponsored by: TechTarget ComputerWeekly.com

    Building a data catalog is an important initiative for many IT and data management teams. But organizations shouldn't undertake a data catalog project without getting input from business users. In this e-guide, learn why data catalogs have become a core component of the data management environment, and the 10 steps to build a data catalog.

  • White Paper Transform your IT with AWS

    Sponsored by: T-Systems

    Many cloud migrations fail not because of technology, but rather because of established business processes or the corporate culture. The goal of a cloud migration should not be transforming your technology, but rather transforming the business. Read on to learn about best practices you can leverage to successfully tackle your cloud migration.

  • Computer Weekly – 18 June 2019: Applying AI to road safety

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we visit a Tokyo project where artificial intelligence is helping to improve road safety by detecting potential subsidence. As bug bounty programmes become popular, we look at what's involved and the pitfalls to beware. And we discuss digital development in healthcare with NHS England. Read the issue now.

  • 5 Essential Steps to Enhancing Interactions with Conversational AI

    Sponsored by: Boost.ai

    This eBook outlines 5 essential steps to successfully automating customer relationships with conversational AI. Learn how to identify use cases, select the right technology, and implement a winning strategy. Read the full white paper to transform your customer experience with AI.

  • Data Warehouse Automation in Azure

    Sponsored by: Qlik

    In this 46-page For Dummies e-book, you'll learn about the benefits of cloud data warehousing, including scalability, security, and real-time analytics. Read on now to find out how you can build an agile data pipeline and accelerate time to value.

  • How To Set Up An HR Function: The Essential Guide And Checklist

    Sponsored by: Sage

    This comprehensive guide walks through the essential steps to set up an effective HR function, from defining your business objectives to establishing policies and performance management. Download the e-book to learn how to build a people-focused strategy that supports your company's growth.

  • A Computer Weekly buyer's guide to big data architecture

    Sponsored by: TechTarget ComputerWeekly.com

    Big data architecture is increasingly proving its worth in business. In this 14-page buyer's guide, Computer Weekly looks at the storage needs that come with artificial intelligence, how to get the most out of data and what it can do to enhance a company's performance.

  • Stop breaches with privileged access security white paper

    Sponsored by: One Identity

    Today's privileged access security is critical to protect digital resources and users. Learn how to implement a modern identity security strategy, including Zero Trust principles, to reduce cyber risks. Read the white paper for more insights.

  • CW Middle East January-March 2020: Digital leads the way at Abu Dhabi oil giant

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of CW Middle East, read how the UAE and the Abu Dhabi National Oil Company have recognised that things will change as oil and gas resources dwindle. Digital technology, such as artificial intelligence, has been identified as a key driver for future industries.

  • Cyber Help (And Hope) For K-12 Targets

    Sponsored by: SonicWall

    Because K–12 systems usually employ fewer cybersecurity experts than other industries, they are a prime target for cybercriminals. So, how can K–12 environments improve security? For guidance, check out this 8-page white paper.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.