ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • No deal Brexit: Ideal or Ordeal?

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.

  • Computer Weekly - 28 September 2021: Chancellor Rishi Sunak talks tech

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the Chancellor of the Exchequer about his plans to support innovation and growth in the UK tech sector. Composable IT is the latest trend in building software to support business change. And Halfords built its own service management software – and now is selling it to other retailers. Read the issue now.

  • Enterprise Grid Report for Contact Center Workforce Spring 2024

    Sponsored by: ServiceNow

    Today, it’s critical for organizations to ensure that they have the right technology and strategies to improve their employee’s schedules, activities, performance, and overall satisfaction. However, deciding on a contact centre workforce solution is easier said than done. Access this guide to learn more.

  • CIO Trends #8: Benelux

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we reveal how the Netherlands are taking the lead in cybersecurity; how Brussels is gearing up to be an insurtech hub and why the Dutch decided to share details of a Russian hacking of a major organisation with the rest of the world.

  • CIO Trends #8: Benelux

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we reveal how the Netherlands are taking the lead in cybersecurity; how Brussels is gearing up to be an insurtech hub and why the Dutch decided to share details of a Russian hacking of a major organisation with the rest of the world.

  • CW APAC: Trend Watch: Cloud networking

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology's advantages and how networking and security might evolve in the future.

  • Software-Defined Storage: A Guide to Successful Implementation

    Sponsored by: IBM

    In this expert e-guide, explore today's SDS implementation options and help you decide which one fits your needs best: commodity or custom hardware. Additionally, uncover the important considerations – like the specific needs of virtual environments, access points, and APIs – that you'll need to address when formulating your storage strategy.

  • CW Benelux November 2019-January 2020: Dutch banks fight money laundering

    Sponsored by: TechTarget ComputerWeekly.com

    Dutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.

  • Doing More With Less Cost-Effective Application Security And Performance Strategies From 7 Companies.

    Sponsored by: Cloudflare

    While the cost of security breaches continues to increase, many security teams have found ways of achieving success with limited resources. This white paper shares real-life stories of companies that have successfully created efficiencies and cut costs in their application security strategy. Download now to discover more.

  • Doing More With Less Cost-Effective Application Security And Performance Strategies From 7 Companies.

    Sponsored by: Cloudflare

    While the cost of security breaches continues to increase, many security teams have found ways of achieving success with limited resources. This white paper shares real-life stories of companies that have successfully created efficiencies and cut costs in their application security strategy. Download now to discover more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.