Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
Computer Weekly – 20 March 2018: Where neuroscience meets technology
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
-
CW Middle East July to Sept 2016
Sponsored by: TechTarget ComputerWeekly.comIn this issue of CW Middle East we look at how CIOs in the region are formulating their virtualisation strategies as organisations warm to the benefits of cloud computing.
-
3 Critical Elements to a Successful Mobile Strategy
Sponsored by: Gozio HealthDownload this eBook to discover the top 3 elements you should consider when designing the right mobile strategy for your hospital or health system.
-
IoT Buyers’ Guide: What to Look for in Enterprise Wireless WAN Solutions for Connected Things
Sponsored by: CradlepointGetting your first few connected devices to market can feel like a monumental accomplishment. Luckily this IoT Buyers' Guide is here to help by providing some important questions, options, and best practices regarding cellular connectivity, security, and flexibility for a variety of enterprise IoT use cases.
-
Identity Fabrics: Analysis and overview
Sponsored by: One IdentityThis Leadership Compass evaluates solutions that can serve as a foundation for building modern Identity Fabrics. It examines the market, product functionality, vendor positions, and innovative approaches. Download the report to learn about the leading solutions for delivering integrated identity services.
-
Data Fabric For Dummies
Sponsored by: Hitachi PentahoIn this digital edition of the popular For Dummies series of reference books, step into the world of data fabrics: inside, learn what a data fabric is and how to realize its benefits, how to effectively build and deploy a data fabric, best practices for optimizing and modernizing data access, and more.
-
Protect Your Attack Surface
Sponsored by: CloudflareExplore "Everywhere Security" in our e-book to protect users, apps, and networks as the corporate perimeter fades. Learn to minimize the attack surface, prevent breaches, block lateral movement, and halt data theft. Secure your organization—read the full e-book.
-
CW ASEAN – September 2018: Time to clear DevOps hurdles
Sponsored by: TechTarget ComputerWeekly.comASEAN organizations are generally aware of the benefits of DevOps, but lesser known are the pathways to success. What would an organization that has successfully implemented DevOps look like?
-
Sustainable cyber security strategy
Sponsored by: NCC GroupAs cybersecurity legislation and regulations continue to evolve, maintaining a sustainable cybersecurity program is critical. Read this white paper now to understand how meeting your organization’s compliance requirements not only boosts its overall cyber security posture but protects its very viability.
-
Navigating Liquid Cooling Architectures for Data Centers with AI Workloads
Sponsored by: Schneider ElectricThis white paper provides guidance on selecting the appropriate liquid cooling architecture for data centers with AI workloads. It covers the key elements of a liquid cooling system, including heat capture, coolant distribution units, and heat rejection methods. Read on to learn how to choose the best liquid cooling solution for your needs.