ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Recommended Inventory for Data Center Scope 3 GHG Emissions Reporting

    Sponsored by: Schneider Electric

    In this paper, explore the FAQs of Scope 3 emissions and discover the inventory of 9 emissions source categories and their data center-specific subcategories for accounting and reporting.

  • A Computer Weekly buyer's guide to NoSQL

    Sponsored by: TechTarget ComputerWeekly.com

    There's a lot of data out there, much of which doesn't need to be stored in heavyweight relational databases complete with complex query languages. In this 13-page buyer's guide, Computer Weekly looks at a new category of NoSQL data stores and how they are being used.

  • Cybersecurity in the era of generative AI

    Sponsored by: IBM

    Read this guide to learn how you can help your clients navigate the security landscape and tap into the resilience of generative AI to protect, prevent and secure their organization’s data, models, and applications.

  • Focus: Women in IT

    Sponsored by: TechTarget ComputerWeekly.com

    Diversity has been an issue in the IT industry for a long time, and the number of women choosing IT for a career has been stagnant over the last few years.

  • Computer Weekly - 8 September 2020: NHS whistleblowers at risk due to poor IT policies

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our investigation into NHS practices shows how poor IT policies are putting whistleblowers at risk. Our buyer's guide examines the networking implications of the surge in remote working. And we assess how well the public cloud giants responded to the demands of the coronavirus pandemic Read the issue now.

  • Security analytics: Enabling organisations to get ahead of attackers

    Sponsored by: TechTarget ComputerWeekly.com

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

  • CIO Trends #9: Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue we take a look at how three banks in Finland are working together so they can free up resources that will help them keep pace with the tech changes in the industry. Also in this issue we look closely at the cloud first policy at shipping giant Maersk.

  • Computer Weekly – 25 July 2017: How the DVLA is making driving digital

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we hear from the DVLA about how it is becoming a digital hub for motoring and moving away from its legacy IT. Our latest buyer's guide examines the future of data management. And we look at the importance of understanding the small print in your software licensing agreements. Read the issue now.

  • The Complete Secure Access Service Edge (SASE) Guide

    Sponsored by: Fortinet, Inc.

    This guide explores the Secure Access Service Edge (SASE) architecture, including how it differs from SD-WAN and security service edge (SSE). Learn about the benefits, challenges, and use cases of SASE to determine if it's the right choice for your organization. Read the full guide to understand this cloud-based network security model.

  • CIO Trends #9

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, take a look at some of our most popular articles on issues faced by IT decision-makers, such as the rise in IT buying decisions from outside the IT department, the importance of ethics in technology, and a look at how the Department for the Environment, Food and Rural Affairs is preparing its IT for the challenges of Brexit.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.