ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Cybersecurity as a Service: A Guide for Buyers and Decision-makers

    Sponsored by: Utimaco

    As cloud adoption grows, cybersecurity is a critical concern. This buyer's guide examines factors to consider when selecting a Cybersecurity as a Service solution, including vendor trust, security requirements, and cost. Learn how to secure your digital business with Utimaco's Trust as a Service. Read the full guide.

  • CIO Trends APAC: Developing a data-driven culture

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about what organisations in Asia-Pacific are doing to sharpen their data analytics strategies to cope with business demands in a challenging economic climate.

  • Cyber Help (And Hope) For K-12 Targets

    Sponsored by: SonicWall

    Because K–12 systems usually employ fewer cybersecurity experts than other industries, they are a prime target for cybercriminals. So, how can K–12 environments improve security? For guidance, check out this 8-page white paper.

  • Master Data Management Strategy Template (eBook)

    Sponsored by: Semarchy

    This Master Data Management Strategy Template provides a comprehensive framework for organizations to successfully establish and maintain a robust MDM program to facilitate data-driven decisions for continuous improvement. Read on to get started.

  • How To Set Up An HR Function: The Essential Guide And Checklist

    Sponsored by: Sage

    This comprehensive guide walks through the essential steps to set up an effective HR function, from defining your business objectives to establishing policies and performance management. Download the e-book to learn how to build a people-focused strategy that supports your company's growth.

  • The State of Cybersecurity in 2023

    Sponsored by: Advanced

    Along with highlighting trends and major risks in cybersecurity in 2023, this report maps out 5 best practices for security success. #1: Reduce your attack surface by segmenting your network and removing any SaaS applications that are no longer necessary for your organization. Continue on to uncover the rest.

  • Computer Weekly – 18 June 2019: Applying AI to road safety

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we visit a Tokyo project where artificial intelligence is helping to improve road safety by detecting potential subsidence. As bug bounty programmes become popular, we look at what's involved and the pitfalls to beware. And we discuss digital development in healthcare with NHS England. Read the issue now.

  • Business Analytics: how AI is augmenting analysis, and bolstering data literacy shortfalls

    Sponsored by: TechTarget ComputerWeekly.com

    Artificial Intelligence and human analysis have been coming together in recent years. Whether using packaged BI and data preparation tools, or languages like Python and R, business analysts and data scientists and engineers alike have been exploring the use of machine learning algorithms to augment their data analyses. Read more in this e-guide.

  • Above All, Do No Harm Navigating AI And Cloud Use In Healthcare

    Sponsored by: AWS Marketplace

    To understand today's healthcare organizations' technology infrastructure, Forrester Consulting, commissioned by AWS Marketplace, surveyed 302 healthcare decision-makers. Download the 2024 report to learn about top challenges, how organizations are using AI and cloud, and more.

  • A Computer Weekly buyer's guide to big data architecture

    Sponsored by: TechTarget ComputerWeekly.com

    Big data architecture is increasingly proving its worth in business. In this 14-page buyer's guide, Computer Weekly looks at the storage needs that come with artificial intelligence, how to get the most out of data and what it can do to enhance a company's performance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.