ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Computer Weekly – 12 February 2019: The Met Office storms ahead on data analytics

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, find out how the Met Office takes 2TB of weather data every hour and turns it into useful business insight. We examine whether Amazon's presence in the retail market is putting off other retailers from using its public cloud services. And we look at the new 802.11ax wireless networking standard. Read the issue now.

  • Next-Gen SASE Will Score the Transformation Trifecta of Distributed Cloud, Workforce, and Edge Applications

    Sponsored by: Aryaka

    This whitepaper examines how the shift to distributed cloud, workforce, and edge applications is transforming enterprise IT. It explores how next-gen SASE solutions can address these evolving requirements by providing flexible connectivity, robust security, and AI-driven management. Read the full whitepaper to learn more.

  • IDC MarketScape: Worldwide Managed Detection and Response 2024 Vendor Assessment

    Sponsored by: Arctic Wolf

    With a shortage of cybersecurity experts in the workforce, many companies turn to managed detection and response (MDR) service providers to fill their needs. Learn all about the state of the MDR market, including top companies to consider and strategic insights in this analyst report.

  • What does cloud computing look like in 2016?

    Sponsored by: TechTarget ComputerWeekly.com

    Cloud computing today is in a phase of rapid take-up. Technology as a service is a top priority for CIOs in Southeast Asia.This guide gives examples of how cloud computing is being harnessed within the region.

  • 20 Ways to Boost Your MSP’s Productivity, Efficiency & Profitability With Auvik

    Sponsored by: Auvik Networks, Inc.

    In this 17-page e-book, discover 20 ways that you can enhance productivity and profitability at your MSP.

  • Decentralising datacentres: The new challenges of security at the edge

    Sponsored by: TechTarget ComputerWeekly.com

    In September 2020, the Computer Weekly Security Think Tank, our panel of information and cyber security experts, consideredthe challenges inherent in decentralising the datacentre, and set out to answer the question, how can security professionals ensure such setups are just as secure as the traditional centralised model? Read more in this e-guide.

  • Computer Weekly - 28 September 2021: Chancellor Rishi Sunak talks tech

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the Chancellor of the Exchequer about his plans to support innovation and growth in the UK tech sector. Composable IT is the latest trend in building software to support business change. And Halfords built its own service management software – and now is selling it to other retailers. Read the issue now.

  • IT Priorities 2020: India

    Sponsored by: TechTarget ComputerWeekly.com

    As an IT powerhouse, India continues to be the pace setter for growth in Asia-Pacific's IT industry. In this guide to IT Priorities in 2020, find out what 243 Indian IT professionals revealed about their digital transformation efforts and key areas of spending for the coming year.

  • Improving Data Quality in the Age of Generative AI

    Sponsored by: Alteryx

    Generative AI can revolutionize your business. But it relies on one crucial element: high-quality data. This playbook from Alteryx and Databricks, “Improving Data Quality in the Age of Generative AI”, will give you strategies to overcome data quality challenges for your generative AI initiatives. Read on now to learn more.

  • Kubernetes: What enterprises need to know

    Sponsored by: TechTarget ComputerWeekly.com

    It is fair to say after years of debate over which technology – out of Docker and Kubernetes –  enterprises would end up favouring when it comes to containerising their apps that the latter has very much won that battle.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.