Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
MicroScope – July 2023: The pressure to deliver
Sponsored by: MicroScopeWith technology always changing, it can feel like an impossible feat to keep up – we speak to experts about how the channel handles rapid change and the pressure this places on partners to meet customer expectations. Also read about major themes of the market and how the topic of return on investments needs to stretch beyond economics
-
8 green computing best practices
Sponsored by: TechTarget ComputerWeekly.comThe overall amount of energy used in data centers is massive: the International Energy Agency (IEA) estimated that data centers used up to 1.3% of the electricity consumed worldwide in 2021. Here are eight green computing practices to make data centers more energy-efficient and sustainable, with both environmental and business benefits.
-
Identifying Use Cases For Ai In Procurement Turning Vision Into Reality
Sponsored by: GEPBy 2026, Gartner predicts, over 80% of businesses will have leveraged generative AI–powered application program interfaces or models. So, what will this massive adoption mean for procurement organizations? In this 15-page white paper, discover AI use cases for procurement leaders.
-
The State of AI at Work
Sponsored by: AsanaThe rapid rise of AI is transforming the workplace. This in-depth report examines the opportunities and challenges of AI adoption, from productivity gains to literacy gaps. Discover the 5 stages of AI maturity and how to harness AI's potential. Read the full report to learn how to move your organization to AI excellence.
-
Red Hat State Of Linux In The Public Cloud
Sponsored by: Red HatMore and more workloads are moving to public cloud environments, sparking a desire to learn why it is seen as beneficial, and what strategies these new cloud adopters are using to ensure success. Explore these discussions further in this Red Hat research report.
-
Cybersecurity resilience in an era of identity sprawl
Sponsored by: One IdentityAs a CISO, your concerns expressed to the board of directors about cybersecurity have been largely drowned out by macroeconomic challenges, pipeline complexity and a need to enable a drastic increase in remote access.
-
Computer Weekly Buyer's Guide: Identity and Access Management
Sponsored by: TechTarget ComputerWeekly.comWhen used effectively, identity and access management can streamline business processes. In this 17-page buyer's guide, Computer Weekly looks at the challenges it can bring large companies, the implications of cloud and how to pick the right service for your firm.
-
IT Project: Migration to cloud
Sponsored by: TechTarget ComputerWeekly.comThe benefits of using cloud are well-known, but the challenges and barriers enterprises come up against during their move off-premise can be wide, varied and unexpected. Knowing how best to negotiate these issues can help speed up the process of shifting workloads and applications to the cloud immeasurably.
-
Get Future-Ready With Composable Solutions From EPAM + Sitecore
Sponsored by: EPAM Systems, IncComposable solutions from EPAM and Sitecore allow brands to build customized digital experiences by combining best-of-breed technologies. Learn how this approach can help you future-proof your business and stay ahead of the competition. Read the full product overview.
-
Cloud PAM Buyer’s Guide A No-Fuss, Non-Salesly Tour Of What Matters Most
Sponsored by: SaviyntWell-run PAM programs add enterprise-wide visibility and leverage identity intelligence and analytics to help leaders make better access decisions. You’re likely hunting for the right list of questions to ask and concerns to raise en route to this more secure reality. Read this guide to learn more.