ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Digital Disruption Index – from experimentation to transformation

    Sponsored by: TechTarget ComputerWeekly.com

    Organisations are investing in digital technologies, including artificial intelligence, blockchain and augmented reality, but executives fear they lack skills to implement a digital strategy, Deloitte's Digital Disruption Index reveals.

  • Don’t drown in data debt; champion your Data First culture

    Sponsored by: Syniti

    Modern enterprises are struggling with data debt, as over 40% of data is unusable. This creates lost opportunity cost. To harness data's full power, enterprises must champion a "Data First" culture, address data quality, and partner with specialized data providers. Download this report to learn how you can reduce your data debt.

  • How financial services organisations can build agility and increase resilience against the cyber security storm

    Sponsored by: Vodafone

    The finance industry is going through a turbulent storm full of new challenges and concerns. Read this eBook for a deep dive into what issues financial services organizations are facing and how technology can help you be better prepared to overcome the challenges of today and the future.

  • Gamma International: The Macedonia files

    Sponsored by: TechTarget ComputerWeekly.com

    This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.

  • The essential guide to understanding AI for SMB and Mid Market leaders in Australia and New Zealand

    Sponsored by: Schneider Electric

    In this white paper, explore the most important trends of AI workloads and today’s top data center challenges, and discover essential guidance to address these challenges for each physical infrastructure category—including power, cooling, racks, and software management, and more.

  • SAST vs. DAST: What Are the Differencesand Why Are They Both Important?

    Sponsored by: Veracode, Inc.

    If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.

  • Top 10 Australian IT stories of 2020

    Sponsored by: TechTarget ComputerWeekly.com

    Against all odds, the Australian people and businesses proved their mettle, becoming one of the first countries in the world to emerge from the pandemic. Companies pivoted quickly and adopted new business models while supercharging digitisation initiatives at an unprecedented pace. Here are Computer Weekly's top 10 Australia IT stories of 2020:

  • Launch, differentiate, and grow your business on AWS

    Sponsored by: AWS

    Discover how AWS enables ISVs to build, market, and scale innovative applications. Leverage the most comprehensive set of AI, ML, and security services to drive technical advances, expand reach, and boost productivity. Learn more about building modern applications on AWS.

  • Computer Weekly – 4 July 2017: Be better connected in a wireless world

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the latest developments in wireless technology and how to deliver secure and reliable wireless networks. We examine Microsoft's PowerShell scripting language to understand why it's such an important tool. And we ask CIOs what it's like to cross the divide and work for IT suppliers. Read the issue now.

  • Top 10 Australia IT stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at what the country is doing to cement its position as a leader in mastering and deploying advanced information and communications technology across a large segment of its economy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.