ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • DIY AI Assessment: Recognizing And Evaluating AI Use Cases With T-Systems

    Sponsored by: T-Systems

    Despite the vast expanse of applications that could benefit from AI integration, the shortage of dedicated AI specialists often poses a bottleneck. This white paper aims to close the gap by enabling software development and operations professionals to effectively recognize AI use cases and perform initial assessments. Read on to learn more.

  • The 2024 Block Data Storage Buyer's Guide

    Sponsored by: StorPool

    How can you ensure you select the most appropriate block storage software or system for your business’ unique needs? Look no further than this Block Storage Buyer's Guide. Download a copy to solve 8 common block storage challenges, to evaluate block storage options, and more.

  • The Cloud Analytics Platform Buyer's Guide

    Sponsored by: Alteryx

    Within an organization, each person has different roles and responsibilities in selecting a cloud analytics platform. Download now to unlock a guide to cloud analytics platforms that addresses the specific needs that apply to your specific role within your organization.

  • Venafi Study: Machine Identities Drive Rapid Expansion of Enterprise Attack Surface

    Sponsored by: Venafi & Intel

    Digital transformation strategies have led to an explosion of machines needing unique identities to connect securely. Read this study to learn why SSL/TLS, SSH and code signing machine identities so appeal to cybercriminals—and how an enterprise-wide machine identity management solution can stop them.

  • Executive Insights: Scoping out Sustainability

    Sponsored by: Schneider Electric

    In this e-book, take a deep dive into the importance of environmental responsibility in the data center, demystify Scope 3, and take a look at the sustainability software available today.

  • Indiana Department of Transportation Uses Cellular to Connect IoT, Roadside Response Vehicles, and Branch Offices

    Sponsored by: Cradlepoint

    Building and maintaining transportation infrastructure for over 6.8 million residents, the Indiana Department of Transportation (INDOT) depends on IoT devices to ensure safety. In turn, those IoT devices depend on reliable, secure network connectivity to run smoothly. So, how does INDOT support such connectivity? Find out in this case study.

  • CW Nordics - May-July 2022: How the Estonian government created a digital assistant to support citizens

    Sponsored by: TechTarget ComputerWeekly.com

    As Estonia finalises the initial version of its government services digital assistant for launch, the man heading the project describes the birth of Bürokratt and beyond. Also read about Helsinki's role in a pan-EU project to introduce drone technology into emergency medical services.

  • Defense Agency Dramatically Shrinks Data Center Footprint

    Sponsored by: Hitachi Vantara

    A defense agency dramatically reduced its data center footprint by 25% through storage virtualization and infrastructure modernization with Hitachi Vantara. The solution delivered major benefits in cost, resiliency, and performance. Read the full case study to learn more.

  • Easy and Affordable Sales & Marketing Basics for MSPs

    Sponsored by: JumpCloud

    This e-book provides actionable tips to help MSPs build an effective marketing foundation, from improving their website to leveraging social media and partner resources. Read on now to learn how to expand your reach and acquire new clients.

  • Email Security Buyer's Guide

    Sponsored by: Checkpoint Software Technologies

    Email is currently the number one attack vector, with hackers exploiting the medium to deliver malware, phishing, and other versatile attack types. To help you overcome the challenges presented by email threats, this buyer’s guide to email security breaks down what it means to be an effective email security solution. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.