ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Computer Weekly – 20 March 2018: Where neuroscience meets technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.

  • CW Middle East July to Sept 2016

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of CW Middle East we look at how CIOs in the region are formulating their virtualisation strategies as organisations warm to the benefits of cloud computing.

  • 3 Critical Elements to a Successful Mobile Strategy

    Sponsored by: Gozio Health

    Download this eBook to discover the top 3 elements you should consider when designing the right mobile strategy for your hospital or health system.

  • IoT Buyers’ Guide: What to Look for in Enterprise Wireless WAN Solutions for Connected Things

    Sponsored by: Cradlepoint

    Getting your first few connected devices to market can feel like a monumental accomplishment. Luckily this IoT Buyers' Guide is here to help by providing some important questions, options, and best practices regarding cellular connectivity, security, and flexibility for a variety of enterprise IoT use cases.

  • Identity Fabrics: Analysis and overview

    Sponsored by: One Identity

    This Leadership Compass evaluates solutions that can serve as a foundation for building modern Identity Fabrics. It examines the market, product functionality, vendor positions, and innovative approaches. Download the report to learn about the leading solutions for delivering integrated identity services.

  • Data Fabric For Dummies

    Sponsored by: Hitachi Pentaho

    In this digital edition of the popular For Dummies series of reference books, step into the world of data fabrics: inside, learn what a data fabric is and how to realize its benefits, how to effectively build and deploy a data fabric, best practices for optimizing and modernizing data access, and more.

  • Protect Your Attack Surface

    Sponsored by: Cloudflare

    Explore "Everywhere Security" in our e-book to protect users, apps, and networks as the corporate perimeter fades. Learn to minimize the attack surface, prevent breaches, block lateral movement, and halt data theft. Secure your organization—read the full e-book.

  • CW ASEAN – September 2018: Time to clear DevOps hurdles

    Sponsored by: TechTarget ComputerWeekly.com

    ASEAN organizations are generally aware of the benefits of DevOps, but lesser known are the pathways to success. What would an organization that has successfully implemented DevOps look like?

  • Sustainable cyber security strategy

    Sponsored by: NCC Group

    As cybersecurity legislation and regulations continue to evolve, maintaining a sustainable cybersecurity program is critical. Read this white paper now to understand how meeting your organization’s compliance requirements not only boosts its overall cyber security posture but protects its very viability.

  • Navigating Liquid Cooling Architectures for Data Centers with AI Workloads

    Sponsored by: Schneider Electric

    This white paper provides guidance on selecting the appropriate liquid cooling architecture for data centers with AI workloads. It covers the key elements of a liquid cooling system, including heat capture, coolant distribution units, and heat rejection methods. Read on to learn how to choose the best liquid cooling solution for your needs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.