ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Strategic IT Management: Balancing Innovation and Operations with the Help of an MSP

    Sponsored by: Advanced

    How do operational and strategic IT differ? Along with exploring how the approaches are unique, this e-book highlights the importance of balancing them—and how an MSP can support your business with that endeavor.

  • Cyber Security: 2021 Worst in Show

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.

  • The patient experience (PX) revolution in healthcare

    Sponsored by: TalkDesk

    Influenced by their consumer interactions, patients now expect easy, seamless, and personalized healthcare experiences.Gain insights from our major global research survey that show how healthcare providers are rethinking and repositioning contact centers in support of a reimagined PX.

  • The IT Leader's Guide To Optimizing Your Cloud Budget:

    Sponsored by: Google Cloud & AMD

    In “The IT Leader's Guide to Optimizing Your Cloud Budget” by Google Cloud and AMD, discover 3 best practices and find out how CPU technology can factor into cost savings.

  • Escaping legacy – removing a major roadblock to a digital future

    Sponsored by: TechTarget ComputerWeekly.com

    Core legacy systems inhibit businesses' ability to meet changing customer demands in the digital age. The scale and nature of the problem is such that it needs to be addressed now.

  • Computer Weekly – 5 March 2019: Modernising IT at the Bank of England

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the Bank of England as it starts the modernisation programme for its core system. We look at the rise of DevSecOps and how it can help deal with increasingly complex security threats. And we examine the different approaches to storage for structured and unstructured data. Read the issue now.

  • Computer Weekly - 16 November 2021: How cosmetics retailer Lush authenticates with ease

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how Lush has modernised authentication, governed by a desire to care for customer data. We talk to Nasa's CDO about data as a strategic asset. And we foreground a call for the government and the Post Office to compensate Horizon victims without delay. Read the issue now.

  • Computer Weekly - 7 July 2020: The privacy challenges of easing lockdown

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as pubs in the UK re-open after lockdown, we examine the privacy issues around collecting customer data for contact tracing. We look at how interconnected devices are revolutionising the manufacturing and engineering sectors. And we assess GDPR progress two years after its introduction. Read the issue now.

  • Fastly Threat Insights Report

    Sponsored by: Fastly

    This 2024 Threat Insights Report offers a comprehensive analysis of the latest attack trends and techniques, designed to help security software managers enhance their defenses.

  • A Computer Weekly buyer's guide to expense management

    Sponsored by: TechTarget ComputerWeekly.com

    Every year, UK businesses deal with about £10bn in expenses claims, but surprisingly few use IT to manage that spend. In this 12-page buyer's guide, Computer Weekly looks at how the application of expense management tools can reward organisations with immediate cost and time savings

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.