ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • VMworld Europe 2016: What to expect

    Sponsored by: TechTarget ComputerWeekly.com

    VMworld Europe 2016 hits Barcelona in October, with VMware expected to announce new and refreshed products and services in support of its end-user computing and cloud strategy. In this e-guide, you'll find case studies featuring last year's winners, along with articles covering the technologies VMware looks set to champion at this year's event.

  • Transform Any Place Into A Smart Space

    Sponsored by: SHI International

    Discover how Cisco Meraki smart space solutions from SHI can transform your buildings into adaptable hubs of collaboration. Learn about enhancing employee productivity, managing environments, and protecting critical infrastructure. Read the full product overview.

  • The next step for your legacy workloads is AWS

    Sponsored by: Virtusa

    Organizations across every industry want to become more agile so they can innovate and respond to changes faster. For many organizations, modernizing enterprise workloads is the best first step toward digital transformation. Read this eBook to learn about why organizations choose to migrate to AWS and how they modernize specific workloads.

  • How Leveraging Artificial Intelligence In Utilization Management Can

    Sponsored by: XSOLIS

    By leveraging the capabilities of machine learning, healthcare organizations can quickly evaluate a patient profile against an entire database of situationally relevant cases, giving them the insights needed to determine the best course of action for each patient’s care. Read on to understand the potential of AI in utilization management.

  • The Vital Role of Market Data Monitoring in Financial Services

    Sponsored by: ITRS Group Limited

    The increasingly digitized capital markets have opened a plethora of new market data channels, which could potentially compromise data quality, control, and management unless they are well managed. In this eBook, take a closer look at market data challenges and emerging trends in market data monitoring.

  • Ultimate IoT implementation guide for businesses

    Sponsored by: TechTarget ComputerWeekly.com

    IT administrators and CIOs considering an internet of things (IoT) deployment must have a thorough understanding of what the IoT is, how it operates, its uses, requirements, tradeoffs and how to implement IoT devices and infrastructures. In this e-guide, learn the requirements and use best practices for a successful deployment.

  • Sparking ABM with the Right Data and Insights

    Sponsored by: TechTarget

    84% of surveyed TechTarget customers reported that they are actively planning and executing ABM in their GTM strategy. So, how can businesses unlock the best results from their ABM program? For guidance, dig into this 12-page e-book penned by TechTarget’s SVP of Customer Strategy and Enablement, Jillian Coffin.

  • Prevention first Cloud Security Whitepaper

    Sponsored by: Checkpoint Software Technologies

    With cloud threats evolving, organizations find themselves exposed and at risk. In response, they need a new more proactive approach to cloud security. This whitepaper outlines Check Point’s new Cloud Security paradigm, which emphasizes a unique technology stack. Read on to learn more.

  • RSA Conference 2020 guide: Highlighting security's human element

    Sponsored by: TechTarget ComputerWeekly.com

    The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.

  • Using IT initiatives to save money and reinforce green credentials

    Sponsored by: TechTarget ComputerWeekly.com

    Analyst Group Quocirca explains how organisations can use web data caching software to save money and improve their green credentials.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.