ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Computer Weekly - 5 May 2020: The role of AI in the war against pandemics

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how AI and data science are supporting the global push to deal with the coronavirus pandemic. We reveal, and talk to, the man behind the world's first computer virus pandemic, the Love Bug. And we examine how the IT services market will change as a result of the current crisis. Read the issue now.

  • The Total Economic Impact™ Of Cloudflare’s Connectivity Cloud

    Sponsored by: Cloudflare

    Cloudflare's connectivity cloud can help enterprises reduce complexity, improve security, and boost productivity. Learn how it can deliver cost savings and business benefits in this Forrester Total Economic Impact study. Read the full report to explore the potential ROI.

  • Computer Weekly - 10-16 September 2019: A tech boost for social care

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.

  • Computer Weekly - 19 October 2021: Making the case for and against police use of facial recognition technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the Met Police enhances its facial recognition capabilities, we examine the pros and cons of law enforcement use of the technology. Three in five IT professionals want a new job – is there a tech exodus in the industry? And we take an in-depth look at the growth of the Nordic datacentre sector. Read the issue now.

  • Generative AI + Healthcare Guidebook

    Sponsored by: AWS Marketplace

    To improve patient outcomes, healthcare organizations are turning to generative artificial intelligence (GenAI). This guidebook answers six questions to help healthcare organizations in the early stages of their generative AI journey. Download now.

  • A Network Perspective on SASE and SD-WAN

    Sponsored by: Titan One Inc.

    Today, direct cloud connectivity, integrated security, and enhanced experiences are driving SD-WAN adoption. As a result, the line between security and networking is becoming thinner. This this Enterprise Strategy Group (ESG) e-book explores how SASE strategies are fueling the convergence of network and security teams. Download to learn more.

  • How manufacturing organisations can build agile and cyber resilient supply chains

    Sponsored by: Vodafone

    In this eBook, you’ll learn about what issues manufacturing organizations are facing, key trends that are impacting them and how technology can help these firms build resilient supply chains against operational risks. Read the eBook.

  • Why you should have a disaster recovery testing plan in place

    Sponsored by: TechTarget ComputerWeekly.com

    With this guide, gain a better understanding of why a disaster recovery testing plan is important, how to efficiently conduct tests, and some tools and terms that you will encounter along the way.

  • Cyber Threat Trends Report: From Trojan Takeovers to Ransomware Roulette

    Sponsored by: Cisco

    The 2024 "Cyber Threat Trends Report" by Cisco analyzes the threats crowding the cyber landscape, including information stealers, Trojans and ransomware. It also provides insights on how DNS security can help defend your organization against those growing threats. Read the 18-page report to unlock the full insights.

  • The Future of Financial Services: Part 2

    Sponsored by: TechTarget ComputerWeekly.com

    In the second part of our 'Future of Financial Services' e-guide series, read about how the financial services industry is not just being shaken up with cosmetic changes, but is about to go through the process of being stripped down and rebuilt.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.