ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Computer Weekly – 8 November 2016: The march of the robot workers

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.

  • Infrastructure For A Connected World

    Sponsored by: Panduit

    Discover in this white paper how Panduit can help your organization with complete network infrastructure solutions, from the data center and office to the plant floor and production line, so that you can get the most out of your infrastructure investment.

  • The Pivot to Digital Transformation

    Sponsored by: Blue Yonder

    In this guide, explore how digitalization is driving the future of manufacturing, as well as the top strategies manufacturers are using right now to ensure supply chain visibility. Click here to learn more.

  • Computer Weekly – 31 July 2018: Learning digital government lessons from Estonia

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at one of the world's most digitally advanced nations, Estonia, and ask what the UK government can learn. We talk to Airbus about how aircraft manufacturers are prioritising cyber security. And we examine how AI and robots will augment – not replace – human productivity. Read the issue now.

  • MicroScope - January 2020: SMEs and managed services

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of MicroScope, we look at the channel opportunity in the SME customer base as they look for managed services support, our roundtable discussion looks at the transformative appeal of unified communications, and consider why software development houses are switching to no-code. Read the issue now.

  • 2024 Cloud Security Report

    Sponsored by: Checkpoint Software Technologies

    As organizations increase their cloud usage, cyberattacks that target cloud infrastructure present a greater threat. This report uncovers the evolving priorities of cloud security, leveraging research from over 800 cloud and cybersecurity professionals to present a holistic bird’s-eye view of the landscape. Read on to learn more.

  • We Solved the Infrastructure Access Problem

    Sponsored by: StrongDM

    In this e-book, you’ll learn how several organizations, from growing startups to established enterprises, solved the access problem using StrongDM. Read now to access their case studies and see how you could follow in the footsteps of their success.

  • Spotlight on the Nordics: Artificial Intelligence

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we explore how artificial intelligence is going to play a key role in the future of the Nordics. We discuss whether AI is truly a threat to humans in terms of the future of work, how AI can benefit humans in the future and how the Finnish government is backing a national AI development strategy.

  • MicroScope E-Zine: January 2017

    Sponsored by: MicroScope

    Is the year ahead a bright one for channel? In this January 2017 edition of MicroScope E-zine, uncover the key expectations for channel in 2017.

  • Remote Connectivity: The Crucial Link For Healthcare Digitalization

    Sponsored by: TeamViewer

    Remote connectivity is crucial for healthcare digitalization, enabling remote patient monitoring, secure access, and instant IT support. Discover how a secure remote connectivity platform can help your organization improve operational efficiency and patient outcomes. Read the full white paper.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.