ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Alchera, an AI Image Recognition Company, Improves Profits with License Management Solution Sentinel

    Sponsored by: Thales

    Alchera, a leading AI image recognition company, has developed cutting-edge technology with 99.99% accuracy. Its solutions are used in various industries, from finance to security. Learn how Alchera's flexible license management with Thales Sentinel helps expand its global reach and customer satisfaction. Read the full content for more details.

  • Transforming Supply Chains to Be Mor Productive, Resilient, and Sustainable

    Sponsored by: Fujitsu

    In this white paper, discover key insights from 3 successful supply chain transformations, and 3 essential proposals for next-generation sustainable supply chains.

  • Improving Endpoint Security and Signature-Based Detection

    Sponsored by: Sentinel Labs, Inc.

    Discover how to enhance malicious code and behavior detection by combining signature-based detection with machine learning. Hear from experts Michael Cobb and Karen Scarfone about how to improve malware threat detection and 10 questions to ask endpoint security vendors.

  • Servicenow Customer Insights Customer Experience Testimonials

    Sponsored by: ServiceNow

    Discover in this e-book how ServiceNow customers continue to persevere— do more with less—while still managing to improve customer satisfaction.

  • The evolution of the agile organisation

    Sponsored by: TechTarget ComputerWeekly.com

    This research by PA Consulting finds that organisations can improve their financial performance as a result of adopting agile techniques.

  • How to achieve container security best practice

    Sponsored by: TechTarget ComputerWeekly.com

    In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.

  • How to achieve container security best practice

    Sponsored by: TechTarget ComputerWeekly.com

    In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.

  • Data Enablement: Empowering a Data-Driven Business

    Sponsored by: Alation

    Many companies often see a lack of widespread adoption for new data products by key stakeholders. Read on to learn why a rich, data-driven culture requires an organization to have a singular platform through which data can be exchanged.

  • 4 IT Automation Myths Dispelled

    Sponsored by: Red Hat

    Read this e-book to learn how to overcome practical barriers to holistic automation adoption within your organization. Coverage includes automation goal setting, common myths, how to unite teams and training, and scaling automation across the business.

  • Computer Weekly – 14 May 2019: The startups transforming data analytics

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we travel to Silicon Valley to meet the emerging tech startups hoping to take data analytics to a new level. The NHS desperately needs to recruit IT professionals – we look at the job opportunities. And we examine the best ways to keep cloud costs under control. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.