ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • The rise of the MSSP

    Sponsored by: MicroScope

    In this e-guide we focus on managed security service providers. We look at how the channel is increasingly aware of the need for MSSPs to meet the demands of customers and the need to adapt and modernise former approaches.

  • CW ASEAN: SD-WAN helps find best route to cloud

    Sponsored by: TechTarget ComputerWeekly.com

    This year, more enterprises will adopt a "cloud-first" SD-WAN architecture designed to efficiently support their increasingly cloud-based application mix. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises gearing up for this eventuality.

  • Datacentre design: Building leaner, greener server farms

    Sponsored by: TechTarget ComputerWeekly.com

    The need for energy efficiency, resiliency and security have, for many years, been the driving forces behind the way that operators have approached building their datacentres. In this e-guide, we take a look at how the need for energy efficiency and sustainability is altering the way operators approach their datacentre builds and designs.

  • Securing DevOps

    Sponsored by: Veracode, Inc.

    Integrating security operations into pre-existing DevOps processes can yield numerous business benefits – including a measurable growth in both profit and revenue. Read this whitepaper to unlock the 5 principles of DevSecOps to help you get started.

  • Implementing GenAI: Use cases & challenges

    Sponsored by: TechTarget ComputerWeekly.com

    The use cases of generative AI are wide-ranging and have the potential to impact nearly all areas in business and IT. In this e-guide on generative AI, learn how to put the technology to work in business applications, DevOps and IT, as well as manage implementation challenges and risks.

  • The future of enterprise IT: Social, social, mobile, analytics and cloud

    Sponsored by: TechTarget ComputerWeekly.com

    Cloud and data technologies are allowing organizations to provide service levels not even dreamt of a few years ago. This guide looks at some examples of these technologies transforming organizations in South-East Asia.

  • The Internet Outage Survival Guide: Unpacking common outages types and how they impact your business

    Sponsored by: Cisco ThousandEyes

    Today, business rely on the Internet more than ever. Yet, the Internet is as unpredictable as it is critical. It's a "best-effort" collection of networks connecting a myriad of providers, and at its very core, the Internet is vulnerable to outages. In this e-book, learn how you can mitigate the risk of an Internet outage.

  • The Business Value of Red Hat Solutions Versus Non-Paid Open Source Alternatives

    Sponsored by: Red Hat

    In this IDC report, The Business Value of Red Hat Solutions Versus Non-Paid Open Source Alternatives, you’ll learn about the financial and business benefits of using Red Hat solutions. Highlights from the report include:540% three-year ROI23% faster development lifecycle for new apps52% faster security updatesRead the IDC report.

  • Acceleration-Optimized Servers and Accelerator Portfolio

    Sponsored by: Dell Technologies

    In this product overview, you'll learn how to accelerate insights and innovation with Dell PowerEdge servers and accelerator portfolios. Read on now to learn how you can leverage the latest technologies like generative AI, large language models, and digital twins to outpace the competition.

  • Calculating ROI of DCIM Monitoring for Distributed IT Sites

    Sponsored by: Schneider Electric

    In this white paper, discover a framework and a tool for quantifying DCIM value to help justify investment in DCIM monitoring and alarming functions.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.