ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • CIO Trends #11: Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    Read in this e-guide how Saudi Arabia is harnessing the cloud during the global healthcare crisis. Also read in this issue how SMEs in the United Arab Emirates are adopting the latest technologies at pace to help their businesses survive the Covid-19 related business disruption.

  • Digital Demand Generation

    Sponsored by: TechTarget

    In this e-book, “Digital Demand Generation,” part of a new series, Digital Skills Acceleration, we discuss how more intelligent content syndication can drive results in the short term and set you up for long-term success. Check it out now.

  • A Proactive Approach To Field Service 5 Priorities For Implementing Strong Service Foundations

    Sponsored by: ServiceNow

    This report explores transitioning from reactive to proactive field service model, highlighting 5 priorities. Read on to understand them and to see how ServiceNow enhances operations by connecting teams, streamlining tasks, and empowering customers with its platform and Field Service Management app.

  • E911: The Ultimate Guide To Compliance

    Sponsored by: Sinch

    Today, 80% of 911 calls are made from mobile devices, it can be difficult to pinpoint a caller’s location. So, how can emergency services revamp their telecom while ensuring their compliance with new E911 laws? Access this white paper to learn more.

  • Embedded Analytics for Dummies

    Sponsored by: Qlik

    In this digital edition of the popular For Dummies series of reference books, explore how embedded analytics can transform your organization by delivering insights where users need them most. Learn how to choose the right cloud analytics platform, design a successful embedded analytics system, and more.

  • 2024 Hybrid Cloud Security Survey

    Sponsored by: Gigamon

    To uncover the true state of Hybrid Cloud Security, Gigamon conducted a study with over 1,000 IT and Security decision makers from across 6 key global markets. This white paper provides a summary of the research, highlighting the most important findings in order to deliver key takeaways. Read on to learn more.

  • Solutions for Medical Devices

    Sponsored by: Wind River

    Explore solutions that enable medical device manufacturers to accelerate digital transformation and innovation. Learn how Wind River's intelligent edge technologies, virtualization, and wireless capabilities can improve patient care, security, and operating efficiency. Read the full white paper to discover more.

  • All-Flash: The Essential Guide

    Sponsored by: TechTarget ComputerWeekly.com

    This guide offers a comprehensive survey of the all-flash array market. We look at all-flash products from the big six storage vendors and the startups and specialists. Plus, we give the lowdown on all-flash vs hybrid flash arrays and all-flash vs server-side PCIe SSD.

  • Computer Weekly - 17 March 2020: How NHS Digital is helping support the coronavirus crisis

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to NHS Digital about how technology is supporting the health service's response to the coronavirus crisis. We examine the challenges of running a successful security operations centre. And we look at the emerging datacentre architecture based on composable infrastructure. Read the issue now.

  • Harnessing AI And Machine Learning To Improve Identity Security

    Sponsored by: SailPoint Technologies

    Access this white paper to discover how AI and machine learning can enhance identity security by detecting anomalies and managing identity outliers. Additionally, you can learn how SailPoint's solutions can strengthen your organization's access governance and cybersecurity posture. Read the full white paper to gain more insight.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.