ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Embracing generative AI

    Sponsored by: Virtusa

    Generative AI is reshaping the workplace, and optimism abounds for its role in enhancing productivity and innovation. This report examines how successful implementations tackle challenges in training, organizational barriers, and governance. Access the full report for details.

  • CW APAC - October 2019: Expert Advice on storage

    Sponsored by: TechTarget ComputerWeekly.com

    The creation of ever-increasing volumes of data is posingescalating problems for storage. In this issue of Expert Advice, Computer Weekly looks at how APAC firms are dealing with storage management issues in the cloud age. Read the issue now.

  • Beyond Activity Measures: Increase SDR Yields by Focusing on Quality

    Sponsored by: TechTarget

    When buyers and sellers divide such a limited amount of time across so many digital touchpoints, there’s little time for quality one-to-one interaction—but plenty of chances to screw things up. In this guide, explore the importance of digital touchpoints with Forrester and TechTarget.

  • How To Build, Scale & Evolve The Modern Data-Driven Demand Gen Engine

    Sponsored by: TechTarget

    In this e-book, explore the key considerations for how to begin, grow and continuously optimize a complete demand gen engine while staying responsive to changing business conditions as you go.

  • Before Tackling Secure Texting In Healthcare, Change Your Company Culture

    Sponsored by: AVST

    In this expert e-guide, learn why the first step to secure communications technology (like texting) is convincing leaders and clinicians to recognize the risks to health data.

  • Generative AI’s Role in Secure Software Development

    Sponsored by: Veracode, Inc.

    In this white paper that features insights from Chief Product Officer at Veracode, Brian Roche, learn how generative AI can help developers deliver secure code quickly.

  • The Federal Data Maturity Report: Optimizing Storage, Operations, and Insights.

    Sponsored by: Hitachi Vantara

    Federal agencies are struggling to manage surging data volumes, with over half feeling their infrastructure is overwhelmed. Learn how they can upgrade storage, enhance security, and democratize data access to drive better mission outcomes. Read the full research report.

  • CIO Trends #2

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly talks to more IT leaders than any other publication, and our reporters gather in-depth insights into the challenges facing CIOs, CTOs and CDOs.

  • Want to Secure Your Hybrid Workforce with ZTNA?

    Sponsored by: Zscaler

    Given the crowded nature of the zero trust network access (ZTNA) market, security professionals are forced to decipher what makes one ZTNA product stand apart from the rest. To find out 10 key, standout features of a ZTNA solution, review this e-book.

  • Balancing Human And Digital: Are Banks Losing Touch With Customers?

    Sponsored by: Avanade

    Today, banks are challenged to balance human engagement and digital interactions – a high-wire act, Avanade explains in this research report. To find out why the pursuit is a challenging one, and to access guidance for approaching it, dive into the 18-page report.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.