ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • A network automation roadmap to reap tech's best benefits

    Sponsored by: TechTarget Networking

    A network automation roadmap can help guide organizations through the Wild West of modern networking in order to reap benefits that automation can bring to employees, customers and partners. Reducing labor-intensive tasks does entail changing a network engineer's work, though.

  • Balancing innovation, safety, compliance, and risk in life sciences

    Sponsored by: XtelligentMedia Healthcare

    The life sciences sector is evolving rapidly, collaboration, compliance, and proactive risk management are key to patient safety.

  • Essential guide to dealing with a data breach

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly's essential guide to dealing with a data breach looks at companies that have been affected and offers advice on how to respond to cyber security occurrences

  • How to Transform Your Business with APIs, Integration & Microservices

    Sponsored by: Software AG

    Explore how APIs, integration, and microservices can unlock innovation, simplify digital transformation, and lower the costs and risks. This e-book examines real-world success stories and provides insights to help your business thrive in a digital world. Read the e-book to learn more.

  • Focus: Securing the cloud

    Sponsored by: TechTarget ComputerWeekly.com

    While cloud services' benefits of quick deployment and flexible scalability at a lower cost have driven enterprise adoption, security concerns continue to be a key factor in determining the extent and style of cloud adoption.

  • Security Products for Protection: Endpoint and Anti-Malware

    Sponsored by: Carbon Black

    Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.

  • A Computer Weekly Buyer's Guide to Internet of Things Security

    Sponsored by: TechTarget ComputerWeekly.com

    In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.

  • Understanding Kubernetes to build a cloud-native enterprise

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide looks at how enterprises are using Kubernetes, while shining a light on the steps CIOs must take to make their application and infrastructure estates container-ready.

  • How AI is Impacting Healthcare

    Sponsored by: XtelligentMedia Healthcare

    President Biden's executive order focuses on the importance of secure and reliable Artificial Intelligence (AI) in various sectors, including healthcare.

  • The role of microservices in agile enterprises

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a closer look at the latest thinking about microservices, from a pros and cons perspective, while also shining a light on the other aspects of agile computing that enterprises need to know about as their digital transformations gather steam.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.