Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
DIY AI Assessment: Recognizing And Evaluating AI Use Cases With T-Systems
Sponsored by: T-SystemsDespite the vast expanse of applications that could benefit from AI integration, the shortage of dedicated AI specialists often poses a bottleneck. This white paper aims to close the gap by enabling software development and operations professionals to effectively recognize AI use cases and perform initial assessments. Read on to learn more.
-
The 2024 Block Data Storage Buyer's Guide
Sponsored by: StorPoolHow can you ensure you select the most appropriate block storage software or system for your business’ unique needs? Look no further than this Block Storage Buyer's Guide. Download a copy to solve 8 common block storage challenges, to evaluate block storage options, and more.
-
The Cloud Analytics Platform Buyer's Guide
Sponsored by: AlteryxWithin an organization, each person has different roles and responsibilities in selecting a cloud analytics platform. Download now to unlock a guide to cloud analytics platforms that addresses the specific needs that apply to your specific role within your organization.
-
Venafi Study: Machine Identities Drive Rapid Expansion of Enterprise Attack Surface
Sponsored by: Venafi & IntelDigital transformation strategies have led to an explosion of machines needing unique identities to connect securely. Read this study to learn why SSL/TLS, SSH and code signing machine identities so appeal to cybercriminals—and how an enterprise-wide machine identity management solution can stop them.
-
Executive Insights: Scoping out Sustainability
Sponsored by: Schneider ElectricIn this e-book, take a deep dive into the importance of environmental responsibility in the data center, demystify Scope 3, and take a look at the sustainability software available today.
-
Indiana Department of Transportation Uses Cellular to Connect IoT, Roadside Response Vehicles, and Branch Offices
Sponsored by: CradlepointBuilding and maintaining transportation infrastructure for over 6.8 million residents, the Indiana Department of Transportation (INDOT) depends on IoT devices to ensure safety. In turn, those IoT devices depend on reliable, secure network connectivity to run smoothly. So, how does INDOT support such connectivity? Find out in this case study.
-
CW Nordics - May-July 2022: How the Estonian government created a digital assistant to support citizens
Sponsored by: TechTarget ComputerWeekly.comAs Estonia finalises the initial version of its government services digital assistant for launch, the man heading the project describes the birth of Bürokratt and beyond. Also read about Helsinki's role in a pan-EU project to introduce drone technology into emergency medical services.
-
Defense Agency Dramatically Shrinks Data Center Footprint
Sponsored by: Hitachi VantaraA defense agency dramatically reduced its data center footprint by 25% through storage virtualization and infrastructure modernization with Hitachi Vantara. The solution delivered major benefits in cost, resiliency, and performance. Read the full case study to learn more.
-
Easy and Affordable Sales & Marketing Basics for MSPs
Sponsored by: JumpCloudThis e-book provides actionable tips to help MSPs build an effective marketing foundation, from improving their website to leveraging social media and partner resources. Read on now to learn how to expand your reach and acquire new clients.
-
Email Security Buyer's Guide
Sponsored by: Checkpoint Software TechnologiesEmail is currently the number one attack vector, with hackers exploiting the medium to deliver malware, phishing, and other versatile attack types. To help you overcome the challenges presented by email threats, this buyer’s guide to email security breaks down what it means to be an effective email security solution. Read on to learn more.