ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Your Guide To Adopting Genai: The Three Stages To Getting Data-Ready For Genai.

    Sponsored by: Atos

    In this white paper, you'll discover how to adopt generative AI (GenAI) and build a GenAI-ready hybrid/multi-cloud infrastructure with Atos and Microsoft. Read on to learn about the three stages to getting your data environment ready for GenAI.

  • Computer Weekly – 10 October 2023: Teeing up tech at the Ryder Cup

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we go behind the scenes at golf's Ryder Cup to see the tech firsts introduced to improve the fan experience. UK tech leaders explain why they feel 'betrayed' by the government's net-zero policy changes. Read the issue now.

  • Computer Weekly - 13 July 2021: Driving intelligence - behind the scenes of Volkswagen's in-car software

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we go behind the scenes of Volkswagen's in-car software R&D centre. The UK's largest supercomputer has gone live in Cambridge – we find out how it will transform healthcare research. And we talk to DWP's digital chief about the restructuring of its IT capabilities. Read the issue now.

  • Addressing Zero Trust for Government: The Role of Identity Security

    Sponsored by: Merlin International

    As governments adopt Zero Trust, identity security is critical. This white paper explores the role of identity security in a Zero Trust architecture, including five key principles and six focus areas to get started. Learn how the CyberArk Identity Security Platform can help you implement a successful Zero Trust strategy.

  • Business transformation through digital modernization

    Sponsored by: AWS

    This eBook outlines the steps to a successful modernization when utilizing cloud technology, including the all-important topic of when to migrate. Read on to access the complete insights from AWS.

  • Mastering Hybrid Cloud Backup Costs, Security and Management

    Sponsored by: Veeam Software

    Unlock cost-effective hybrid cloud backup strategies. Learn to secure data and improve efficiency with expert tips in this e-book.

  • Your Guide To Deploying Azure Virtual Desktop In Minutes

    Sponsored by: Nerdio

    Azure Virtual Desktop (AVD) has rapidly gained popularity in recent years as one of the most cost-effective cloud-based virtual desktop solutions. But getting AVD up and running can be a boring process no IT technician likes spending time on. Download this guide to learn how to deploy AVD in less than 15 minutes.

  • Big data analytics & innovation in Australian healthcare

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, find out how healthcare providers in Australia and the rest of APAC have successfully tapped the power of data analytics and other related technologies to advance digital health and better position themselves to cope with the growing demand for healthcare.

  • Digital Transformation In HR: The 10-Step Guide

    Sponsored by: Sage

    This 10-step guide provides a comprehensive approach to digital transformation in HR, from aligning goals to the business, to building a business case, and experimenting with new technologies. Learn how to drive business resilience and create amazing hybrid work experiences. Read the full Buyer's Guide.

  • Zero Standing Privilege

    Sponsored by: CyberFOX

    Cybersecurity threats are on the rise, and businesses must take action to protect their data. This e-book explores the top cyber risks, the costs of breaches, and how to implement a Zero Trust security model with Privileged Access Management (PAM). Access the e-book to learn how to secure your organization and minimize risk.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.