ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • CW APAC – October 2020: Trend Watch: Storage

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly takes a peek at future storage technologies, such as helium and DNA, and offers some valuable tips on how to keep cloud storage costs under control. Read the issue now.

  • The Complete Guide To Oracle Hyperion Support Services

    Sponsored by: US Analytics

    If you don’t want to hire an in-house admin to manage Oracle Hyperion, you can instead consider Hyperion managed services. However, several questions may arise during this process related to cost and levels of support. Read this e-book to get these questions answered and to ensure your deployment and administration is smooth and streamlined.

  • Computer Weekly –18 February 2020: Trust no one – the benefits of zero-trust security

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we take an in-depth look at zero-trust security and examine how it changes traditional IT risk models. After SAP extended the support deadline for its ECC ERP system, we find out the options for users. And we analyse explainable AI and the ethical importance of understanding algorithms. Read the issue now.

  • Nordics are leading the datacentre revolution

    Sponsored by: TechTarget ComputerWeekly.com

    The Nordic region has space, access to renewable energy, a cool climate and a well-educated workforce. All these things make it a great place to build a datacentre. Read in this e-guide how the Nordic region is leading the datacentre revolution.

  • Computer Weekly – 6 February 2018: How a digital workplace can drive innovation

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at some of the latest tools for the digital workplace and find out how they can improve collaboration and innovation. We ask what lessons the demise of Carillion has for IT outsourcing. And the CIO of retailer River Island tells us how technology is changing the high street in fashion. Read the issue now.

  • Managing the invisible risk of non-human identities

    Sponsored by: One Identity

    As non-human identities (NHIs) proliferate, securing them is critical to avoid breaches and compliance issues. This white paper outlines the risks of unsecured NHIs and best practices for managing them, including identity discovery, risk assessment, and privileged access controls. Learn how to gain visibility and control over your NHIs.

  • CW Nordics November 2016

    Sponsored by: TechTarget ComputerWeekly.com

    This quarter, we look at the impact of Nokia layoffs on Finland, and in particular the city of Espoo which is home to both Nokia and Microsoft's Finnish headquarters. We also look at how Denmark's Bang & Olufsen is taking control of sales data with cloud-based software.

  • Examining Identity and Access Management's Function in Healthcare

    Sponsored by: XtelligentMedia Healthcare

    Identity and access management is a crucial component of any healthcare organization's security strategy.

  • Data quality emerges from Covid-19 more critical than ever

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.

  • Steering the Shift of Software Innovation

    Sponsored by: AWS

    What opportunities do the cloud and SaaS provide for software developers? Download this e-book to discover 8 of them and to learn about a partner that can help your software developers realize the benefits.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.