ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • ANZ IT Priorities 2022: Top Observations & Trends

    Sponsored by: TechTarget ComputerWeekly.com

    Inside this report, read more about the findings from the 2022 TechTarget/Computer Weekly's IT priorities study, as well as insights on how ANZ enterprises are directing their IT investments and what are the main observations and trends for Australia and New Zealand in 2022.

  • Build a Better Webinar: Developing Your Brand

    Sponsored by: BrightTALK by TechTarget

    From landing pages to email promotions, learn how to develop a strong webinar brand that helps share your message and builds excitement across your audience.

  • A Computer Weekly buyer's guide to cloud-native architectures

    Sponsored by: TechTarget ComputerWeekly.com

    Cloud-native architectures are seen as the future for businesses. In this 16-page buyer's guide, Computer Weekly looks at the influence of DevOps and microservices-based technology, the continued importance of security in containers for software development and the suitability of Microsoft Azure for deploying cloud-native applications

  • Computer Weekly – 28 June 2022: Why collaboration – not competition – is the key to IT sustainability

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as sustainability rises up the corporate agenda, IT leaders say more collaboration is needed to meet climate goals. Microsoft faces further calls for greater transparency over software tools used to monitor employees. And the cyber security industry warns over an increasing loss of talent. Read the issue now.

  • The HIPAA Compliant Email Checklist

    Sponsored by: Paubox

    To discover how to ensure that your company's email is HIPAA compliant, dig into this checklist.

  • Hybrid cloud: Building bridges between the cloud and enterprise datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a closer look at how the major cloud providers are making it possible for their users to shift their datacentre-based applications and workloads to the cloud, as enterprise demand for hybrid deployments continues to soar.

  • Don't Let Complacency Allow Mobile Threats Breach Your Enterprise

    Sponsored by: Lookout

    In this expert guide, learn how a lackadaisical attitude towards mobile security can prove to be catastrophic to enterprises as mobile threats continue to exploit known vulnerabilities to gut profits.

  • Computer Weekly – 12 January 2021: Can AI ever match the power of the brain?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, artificial intelligence is still no match for the brain – we talk to Intel's neuromorphic computing lab to see how researchers are trying to address that. Our buyer's guide examines identity and access management. And we find out why datacentres are becoming a new target for financial investors. Read the issue now.

  • ACCELERATE DIGITAL INNOVATION WITH NOW ASSIST

    Sponsored by: ServiceNow

    Discover how ServiceNow's Now Assist for Creator can accelerate app development and delivery with AI-powered features like flow generation, code recommendations, and conversational app creation. Read the white paper to learn how to boost developer productivity and innovation.

  • MicroScope – September 2021: Stepping forward after Covid

    Sponsored by: MicroScope

    In this issue, discover what the lasting impact of Covid-19 is likely to be as the channel emerges into a post-pandemic world. Also discover more about disaster recovery for SMEs and how best to make a plan to protect your business, and read about an uptick in cloud-based contact centre-as-a-service solutions

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.