Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
Jargon Buster Guide to Virtualisation
Sponsored by: TechTarget ComputerWeekly.comThis jargon buster e-guide will detail everything an enterprise IT manager needs to know about the concept of virtualisation, while also taking a look at what enterprises are doing to build upon this now commonplace bedrock within most enterprise IT estates.
-
Build a Production-grade Cloud to Support Modern IT
Sponsored by: Red HatExplore how Red Hat Enterprise Linux and Microsoft Azure can help you build a production-grade cloud environment to support modern IT needs. Learn about securing remote access, managing costs, and ensuring availability and reliability. Read the full White Paper to get started.
-
How Van Horn Improves Employee Training By 20%
Sponsored by: T-Mobile for Business“Amaze Our Customers”: This is Van Horn Automotive Group’s philosophy. To continue fulfilling that mission, Van Horn set out to transform its communications system. This case study maps out the journey, breaking down how, in addition to modernizing its communications, Van Horn improved its onboarding training. Read on for more details.
-
Cloud networking and CDN: How to get the best for your business
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we will be looking at how to bring innovative new software-defined tools to bear on multicloud environments, uncover some of the potential pitfalls of cloud networks and (hopefully) how to avoid them, and take a swing through the related world of content delivery networks (CDNs).
-
How businesses can win talent war with mobile apps, HR data analytics, and cloud technology
Sponsored by: TechTarget ComputerWeekly.comBecoming more digital has emerged as a ruling concept among forward-looking organisations in recent years. Now, while having multi-channel engagement with customers is a big aspect of digital, so too is attracting and retaining the employees who can make a reality of digital transformation.
-
Finding Your Digital Adversaries. Before They Find You.
Sponsored by: CounterCraftDiscover how digital twin technology can help you proactively defend against sophisticated cyber threats. Learn how threat deception and specific, actionable intelligence powered by deception can fortify your cybersecurity defenses. Read the e-book to learn more.
-
Step-by-step disaster recovery planning guide
Sponsored by: TechTarget ComputerWeekly.comIT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.
-
Datacentres of tomorrow: What the future holds
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we take a look at some of the technologies that are being widely-tipped to become a mainstay of datacentres in the future. At the same time, it also touches upon some of the new and emerging technologies that look set to shake-up the way datacentres are managed, monitored, powered and cooled as well.
-
Build a Better Webinar: Recruiting and Prepping Speakers
Sponsored by: BrightTALK by TechTargetTo produce a successful webinar, you need an effective speaker. However, presenting key information in a clear, concise, and engaging way can sometimes be easier said than done. Access this guide for essential tips and tricks for prepping and recruiting your webinar speakers.
-
The insurance data and AI revolution
Sponsored by: SASWith 64% of CIOs reporting that they’re planning on increasing their business intelligence and analytics investments to transform their organisations, it has become critical for insurance leaders to rethink their approaches to serving their customers. So, how can this best be done? Dig into this guide to gain more insight.