ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • How Revenue Cycle Management Is Optimized by Robotic Process Automation

    Sponsored by: XtelligentMedia Healthcare

    Robotic process automation (RPA) saves practices money and time by automating manual, repetitive tasks within revenue cycle management.

  • Container technologies and trends: What enterprises need to know

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a look at how and why enterprises are tapping into containers to bolster the business agility of their IT infrastructure and application estates, and some of the latest thinking about how best to utilise container technologies.

  • CW Nordics - August-October 2022: Norway struggles to keep up with demand for tech specialists

    Sponsored by: TechTarget ComputerWeekly.com

    The growing importance of IT in all industries, along with a shortage in skills, make for an excellent high-tech job market for candidates in Norway. Read how recruiters are struggling to keep up with demand. Also read how the Danish government encourages research in strategic fields to attract tech companies.

  • Computer Weekly – 1 October 2024: AI advances in cancer care

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, medtech startups are showing how AI can offer dramatic advances in cancer care – we talk to one such firm to find out more. Every CIO is used to delivering rapid response times for users, but not many target latency of eight nanoseconds – we find out how it's done. Read the issue now.

  • Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated

    Sponsored by: TechTarget ComputerWeekly.com

    This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.

  • Observability engineering

    Sponsored by: Honeycomb

    Observability is critical for managing today's software.This O'Reilly e-book presents 321 pages of expert insights on the state of observability engineering, giving you the information you need to understand the most prevalent trends and strategies. Read on to learn more.

  • MicroScope – October 2020: Get in touch with remote network security

    Sponsored by: MicroScope

    In this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption

  • Computer Weekly – 6 February 2024: Generative AI – an early adopter's experience

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.

  • The next step for your legacy workloads is AWS

    Sponsored by: AllCloud

    The pace of business is increasing, and organizations that don't put in the effort now to ensure their organization is agile enough to keep up will soon find themselves at a competitive disadvantage. This white paper looks at how AWS and AllCloud can help your organization prepare for the future. Read on to learn more.

  • MITRE ATT&CK, a guide for businesses in 2022

    Sponsored by: TechTarget ComputerWeekly.com

    Mitre ATT&CK is a framework, but it can also serve as a foundation to address cybersecurity as a whole moving forward. Download this e-guide and learn more about the Mitre ATT&CK framework, and which trends are shaping the way this tool can be applied to cyber security around the globe.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.