ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • The Cloud Influence on GRC

    Sponsored by: TechTarget Security

    Cloud computing risk management, governance and compliance processes are evolving as organizations increasing turn to hosted services. Learn how in our SearchCompliance handbook.

  • How to unlock the true value of data

    Sponsored by: TechTarget ComputerWeekly.com

    With a robust data architecture in place, a firm's data science team can turn raw data into business insight. We take a quick look at how this can be done.

  • Hyperconverged Reference Architecture

    Sponsored by: Panduit

    In this e-book, explore Panduit’s proposals of foundational reference architecture utilizing a Dell Technologies configuration and validated Panduit physical infrastructure components.

  • How AI improves Predictive Maintenance

    Sponsored by: TechTarget ComputerWeekly.com

    Kone and ThyssenKrupp are using artificial intelligence to improve predictive maintenance of their lifts and escalators.

  • How AI improves Predictive Maintenance

    Sponsored by: TechTarget ComputerWeekly.com

    Kone and ThyssenKrupp are using artificial intelligence to improve predictive maintenance of their lifts and escalators.

  • GenAI: Empowering enterprises and engineering for the future

    Sponsored by: Virtusa

    Discover how generative AI (genAI) is transforming enterprises and engineering. Learn about leveraging GenAI to build new revenue streams, boost productivity, and enhance data engineering. Explore the enterprise readiness of AI tools and Virtusa's perspective on empowering the future. Read the white paper to learn more.

  • Cyber security in the Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.

  • CW EMEA - April 2024: The blueprint for safe GenAI

    Sponsored by: TechTarget ComputerWeekly.com

    In the Netherlands, the government has formulated a vision document to guide its citizens and businesses on the safe and responsible use of GenAI.

  • Zscaler ThreatLabz State of Encrypted Attacks Report

    Sponsored by: Zscaler

    Encrypted attacks grew 24.3% year-over-year, with malware, ad spyware sites, and phishing making up 99% of threats. Education and government saw the largest increases. Learn how to defend against these evolving encrypted threats in the Zscaler ThreatLabz State of Encrypted Attacks Report.

  • Russia's answer to Silicon Valley

    Sponsored by: TechTarget ComputerWeekly.com

    The Russian government is investing in an ambitious project to create its own technology hub that they hope will go on to rival Silicon Valley. The billions of rubles of government money being invested on the outskirts of Moscow has the backing of several multinational technology companies IBM, SAP, Intel, Cisco and Siemens.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.