ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Computer Weekly – 28 January 2020: IT must play its part in tackling the climate crisis

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at this year's World Economic Forum and find out how the IT sector is aiming to help tackle climate change. Our buyer's guide assesses onsite, offsite and cloud-based disaster recovery. And IT contractors are up in arms about the government's loan charge policy – we examine the issues. Read the issue now.

  • The Total Economic Impact™ Of Honeycomb

    Sponsored by: Honeycomb

    To help DevOps and engineering teams enhance their production processes, Honeycomb developed an observability tool. Tap into this “Total Economic Impact” report to review Forrester’s analysis of the tool.

  • Edge and Industrial IoT at Scale

    Sponsored by: SUSE

    In this 57-page Gorilla Guide you’ll learn how to employ best practices in edge computing that include the use of open source platforms, the integration of information technology (IT) and operations technology (OT) and the use of validated designs. Access the guide.

  • Accelerate your Cloud

    Sponsored by: Red Hat

    Accelerate your cloud migration and realize the full potential of your hybrid cloud with Red Hat Ansible Automation Platform, now available on AWS Marketplace. Achieve faster business outcomes, increased collaboration, and optimized cloud growth. Learn more in this White Paper.

  • The State Of Incident Management Report 2024

    Sponsored by: Atlassian

    This comprehensive report benchmarks the state of incident management in 2024, covering topics like communication, tooling, AI, and areas for improvement. Discover how leading organizations are managing incidents more proactively and efficiently. Read the full White Paper to learn industry insights and best practices.

  • Endpoint Protection Buyer’s Guide

    Sponsored by: CrowdStrike

    Explore the critical capabilities required for modern endpoint protection, including AI-powered prevention, advanced detection and response, identity threat detection, threat intelligence, and managed threat hunting. Download the Endpoint Protection Buyer's Guide to learn how to secure your organization against today's sophisticated threats.

  • Pervasive ECM Problems and How to Solve Them

    Sponsored by: OpenText

    Access this expert e-guide to learn how older ECM tools are straining under increasing workloads and sub-par configurations. Also, explore how mobile, social, IoT, and other relatively new technologies are creating problems for ECM systems.

  • Optimize your apps through the transformative power of cloud

    Sponsored by: AWS

    Discover how to accelerate your software company's cloud transformation and achieve smarter growth. Learn strategies to modernize infrastructure, boost developer productivity, and optimize costs. Download the e-book to unlock the full transformative power of the cloud.

  • Realize The Full Value Of Your Existing IT Investments With End-To-End Hardware Asset Management

    Sponsored by: ServiceNow

    Read this e-book to see how you can automate your hardware asset management to maximize the value of your current technology investments and help your IT teams become a strategic business partner.

  • Buyer’s Guide for Continuous Compliance Solutions in DevOps

    Sponsored by: Progress Software Corporation

    Achieve continuous compliance and security in DevOps by adopting a Policy-as-Code approach. Discover how to mitigate compliance risks, streamline audits, and enhance your security posture. Read this buyer's guide to learn the key selection criteria for choosing the right continuous compliance solution.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.