ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Amplifying Your Webinar Reach with Social Media

    Sponsored by: BrightTALK by TechTarget

    Access Amplifying Your Webinar Reach with Social Media for tips on how to effectively utilize social content before, during, and after your webinar to create a scalable social media promotion plan that improves the ROI of your webinar programs.

  • Computer Weekly – 24 October 2023: Brewing data insights at Heineken

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how brewing giant Heineken is building a data ecosystem to share insights and tap into AI capabilities. The UK is conducting an investigation into cloud supplier dominance – what will it mean for users? And we examine how generative AI could be used to improve customer experience. Read the issue now.

  • The Business Value of Red Hat Solutions Versus Non-Paid Open Source Alternatives

    Sponsored by: Red Hat

    In this IDC report, The Business Value of Red Hat Solutions Versus Non-Paid Open Source Alternatives, you’ll learn about the financial and business benefits of using Red Hat solutions. Highlights from the report include:540% three-year ROI23% faster development lifecycle for new apps52% faster security updatesRead the IDC report.

  • Datacentre design: Building leaner, greener server farms

    Sponsored by: TechTarget ComputerWeekly.com

    The need for energy efficiency, resiliency and security have, for many years, been the driving forces behind the way that operators have approached building their datacentres. In this e-guide, we take a look at how the need for energy efficiency and sustainability is altering the way operators approach their datacentre builds and designs.

  • CW ASEAN: SD-WAN helps find best route to cloud

    Sponsored by: TechTarget ComputerWeekly.com

    This year, more enterprises will adopt a "cloud-first" SD-WAN architecture designed to efficiently support their increasingly cloud-based application mix. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises gearing up for this eventuality.

  • Implementing GenAI: Use cases & challenges

    Sponsored by: TechTarget ComputerWeekly.com

    The use cases of generative AI are wide-ranging and have the potential to impact nearly all areas in business and IT. In this e-guide on generative AI, learn how to put the technology to work in business applications, DevOps and IT, as well as manage implementation challenges and risks.

  • The Internet Outage Survival Guide: Unpacking common outages types and how they impact your business

    Sponsored by: Cisco ThousandEyes

    Today, business rely on the Internet more than ever. Yet, the Internet is as unpredictable as it is critical. It's a "best-effort" collection of networks connecting a myriad of providers, and at its very core, the Internet is vulnerable to outages. In this e-book, learn how you can mitigate the risk of an Internet outage.

  • The future of enterprise IT: Social, social, mobile, analytics and cloud

    Sponsored by: TechTarget ComputerWeekly.com

    Cloud and data technologies are allowing organizations to provide service levels not even dreamt of a few years ago. This guide looks at some examples of these technologies transforming organizations in South-East Asia.

  • Design Update Capabilities for Medical Devices

    Sponsored by: Wind River

    Designing secure, reliable software update capabilities is crucial for medical devices to meet evolving regulatory requirements and improve patient safety. Learn how Wind River's virtualization, real-time OS, and cloud-native solutions can help you build in these critical update capabilities. Read the white paper.

  • Calculating ROI of DCIM Monitoring for Distributed IT Sites

    Sponsored by: Schneider Electric

    In this white paper, discover a framework and a tool for quantifying DCIM value to help justify investment in DCIM monitoring and alarming functions.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.