ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Jargon Buster Guide to Virtualisation

    Sponsored by: TechTarget ComputerWeekly.com

    This jargon buster e-guide will detail everything an enterprise IT manager needs to know about the concept of virtualisation, while also taking a look at what enterprises are doing to build upon this now commonplace bedrock within most enterprise IT estates.

  • Build a Production-grade Cloud to Support Modern IT

    Sponsored by: Red Hat

    Explore how Red Hat Enterprise Linux and Microsoft Azure can help you build a production-grade cloud environment to support modern IT needs. Learn about securing remote access, managing costs, and ensuring availability and reliability. Read the full White Paper to get started.

  • How Van Horn Improves Employee Training By 20%

    Sponsored by: T-Mobile for Business

    “Amaze Our Customers”: This is Van Horn Automotive Group’s philosophy. To continue fulfilling that mission, Van Horn set out to transform its communications system. This case study maps out the journey, breaking down how, in addition to modernizing its communications, Van Horn improved its onboarding training. Read on for more details.

  • Cloud networking and CDN: How to get the best for your business

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we will be looking at how to bring innovative new software-defined tools to bear on multicloud environments, uncover some of the potential pitfalls of cloud networks and (hopefully) how to avoid them, and take a swing through the related world of content delivery networks (CDNs).

  • How businesses can win talent war with mobile apps, HR data analytics, and cloud technology

    Sponsored by: TechTarget ComputerWeekly.com

    Becoming more digital has emerged as a ruling concept among forward-looking organisations in recent years. Now, while having multi-channel engagement with customers is a big aspect of digital, so too is attracting and retaining the employees who can make a reality of digital transformation.

  • Finding Your Digital Adversaries. Before They Find You.

    Sponsored by: CounterCraft

    Discover how digital twin technology can help you proactively defend against sophisticated cyber threats. Learn how threat deception and specific, actionable intelligence powered by deception can fortify your cybersecurity defenses. Read the e-book to learn more.

  • Step-by-step disaster recovery planning guide

    Sponsored by: TechTarget ComputerWeekly.com

    IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.

  • Datacentres of tomorrow: What the future holds

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a look at some of the technologies that are being widely-tipped to become a mainstay of datacentres in the future. At the same time, it also touches upon some of the new and emerging technologies that look set to shake-up the way datacentres are managed, monitored, powered and cooled as well.

  • Build a Better Webinar: Recruiting and Prepping Speakers

    Sponsored by: BrightTALK by TechTarget

    To produce a successful webinar, you need an effective speaker. However, presenting key information in a clear, concise, and engaging way can sometimes be easier said than done. Access this guide for essential tips and tricks for prepping and recruiting your webinar speakers.

  • The insurance data and AI revolution

    Sponsored by: SAS

    With 64% of CIOs reporting that they’re planning on increasing their business intelligence and analytics investments to transform their organisations, it has become critical for insurance leaders to rethink their approaches to serving their customers. So, how can this best be done? Dig into this guide to gain more insight.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.