ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • MicroScope – July 2023: The pressure to deliver

    Sponsored by: MicroScope

    With technology always changing, it can feel like an impossible feat to keep up – we speak to experts about how the channel handles rapid change and the pressure this places on partners to meet customer expectations. Also read about major themes of the market and how the topic of return on investments needs to stretch beyond economics

  • 8 green computing best practices

    Sponsored by: TechTarget ComputerWeekly.com

    The overall amount of energy used in data centers is massive: the International Energy Agency (IEA) estimated that data centers used up to 1.3% of the electricity consumed worldwide in 2021. Here are eight green computing practices to make data centers more energy-efficient and sustainable, with both environmental and business benefits.

  • Identifying Use Cases For Ai In Procurement Turning Vision Into Reality

    Sponsored by: GEP

    By 2026, Gartner predicts, over 80% of businesses will have leveraged generative AI–powered application program interfaces or models. So, what will this massive adoption mean for procurement organizations? In this 15-page white paper, discover AI use cases for procurement leaders.

  • The State of AI at Work

    Sponsored by: Asana

    The rapid rise of AI is transforming the workplace. This in-depth report examines the opportunities and challenges of AI adoption, from productivity gains to literacy gaps. Discover the 5 stages of AI maturity and how to harness AI's potential. Read the full report to learn how to move your organization to AI excellence.

  • Red Hat State Of Linux In The Public Cloud

    Sponsored by: Red Hat

    More and more workloads are moving to public cloud environments, sparking a desire to learn why it is seen as beneficial, and what strategies these new cloud adopters are using to ensure success. Explore these discussions further in this Red Hat research report.

  • Cybersecurity resilience in an era of identity sprawl

    Sponsored by: One Identity

    As a CISO, your concerns expressed to the board of directors about cybersecurity have been largely drowned out by macroeconomic challenges, pipeline complexity and a need to enable a drastic increase in remote access.

  • Computer Weekly Buyer's Guide: Identity and Access Management

    Sponsored by: TechTarget ComputerWeekly.com

    When used effectively, identity and access management can streamline business processes. In this 17-page buyer's guide, Computer Weekly looks at the challenges it can bring large companies, the implications of cloud and how to pick the right service for your firm.

  • IT Project: Migration to cloud

    Sponsored by: TechTarget ComputerWeekly.com

    The benefits of using cloud are well-known, but the challenges and barriers enterprises come up against during their move off-premise can be wide, varied and unexpected. Knowing how best to negotiate these issues can help speed up the process of shifting workloads and applications to the cloud immeasurably.

  • Get Future-Ready With Composable Solutions From EPAM + Sitecore

    Sponsored by: EPAM Systems, Inc

    Composable solutions from EPAM and Sitecore allow brands to build customized digital experiences by combining best-of-breed technologies. Learn how this approach can help you future-proof your business and stay ahead of the competition. Read the full product overview.

  • Cloud PAM Buyer’s Guide A No-Fuss, Non-Salesly Tour Of What Matters Most

    Sponsored by: Saviynt

    Well-run PAM programs add enterprise-wide visibility and leverage identity intelligence and analytics to help leaders make better access decisions. You’re likely hunting for the right list of questions to ask and concerns to raise en route to this more secure reality. Read this guide to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.