ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Techniques for advancing value-based care in the face of an impending health crisis

    Sponsored by: XtelligentMedia Healthcare

    Centering provider and member experience will be key to accelerating value-based care in the coming years.

  • Artificial Intelligence: The New Frontier In Cybersecurity

    Sponsored by: OpenText

    AI is transforming cybersecurity, empowering organizations to detect, respond to, and mitigate threats with unprecedented speed and accuracy. This white paper explores the diverse AI models and applications that are revolutionizing security operations. Learn how AI can enhance your cybersecurity defenses.

  • The Modern Application Development Playbook

    Sponsored by: Fastly

    Scaling, performance, and optimization represent big challenges in the development of modern applications. Serverless computing at the edge represents the first and only option that satisfies DevOps while allowing organizations to maintain the rapid pace of innovation. Download this eBook to learn more.

  • Case study: Using pre-fab datacentres to meet Norway's growing demand for colocation space

    Sponsored by: TechTarget ComputerWeekly.com

    Datacentre operator Green Mountain embraces Schneider Electric's pre-fabricated datacentre designs to ensure it is positioned to respond to the growing demand from the hyperscale and HPC communities for colocation capacity in Norway

  • European colocation growth trends: Under the microscope

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we'll take a close look at how the European colocation market is performing as a whole, as well as looking ahead to some of the challenges the sector's biggest players face when it comes to ensuring the growth they have enjoyed in recent years continues despite the instability caused by political, environmental and economic events.

  • Network Infrastructure for Commercial Real Estate

    Sponsored by: Panduit

    Discover in this white paper how your organization can establish robust and reliable network infrastructure that empowers tenants with the connectivity they need to support whatever applications they have in place.

  • Computer Weekly - 12 April 2022: Disney combines digital, data and creativity for ad opportunities

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to Disney Advertising Sales about how it is using data to subserve story-telling excellence. We delve into how rising energy costs negatively impacted the the UK arm of Sungard Availability Services. And we look at the role of infrastructure as code in edge datacentres. Read the issue now.

  • Transform Your Business With A Trusted Cloud Partner

    Sponsored by: Virtusa

    To achieve the desired outcomes of a cloud migration, organizations must create a detailed strategy that identifies the most efficient path to modernization. In this e-book, you’ll discover a streamlined approach to migration designed to ensure a smooth, effective cloud transition. Read on to learn how you can make the most of your migration.

  • Upgrade or rework: Pathway to application modernisation

    Sponsored by: TechTarget ComputerWeekly.com

    If there is one certainty in IT, it is that at some point, every shiny new application will become legacy. The tech sector is driven by a fast cadence of innovation, which means that last year's "must have" phenomenon quickly becomes stale and out-of-date. In this e-guide, we explore the different approaches to modernising outdated IT systems.

  • Richmond Advisory Group Incident Readiness Response

    Sponsored by: AT&T and LevelBlue

    To understand why mid-market organizations and SMEs purchase incident readiness and response services, The Richmond Advisory Group surveyed 500 cybersecurity decision-makers. Review the survey’s findings in this 2024 report, “Why Mid-market Organizations Are Prioritizing Incident Readiness and Response in the Face of Regulatory Scrutiny.”

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.