ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Spreadsheet User's Guide to Modern Finance Analytics

    Sponsored by: Alteryx

    Spreadsheets have long been the go-to tool for finance, but as data grows, their limitations—manual, time-consuming, decentralized, and error-prone—become clear.That's why 50% of users are exploring more advanced analytical solutions. Access this e-book to learn more.

  • MicroScope – December 2022: Dealing with rising prices

    Sponsored by: MicroScope

    With prices rising, many are looking at what costs to cut – yet in the channel, the opposite might prove for better business. In this issue, read about how to navigate the cost issue, learn about the growing area of security, and learn about how to create a more appealing employment experience to attract talent

  • CW ASEAN: Unlock flash opportunities

    Sponsored by: TechTarget ComputerWeekly.com

    Traditional disks can no longer keep up with the needs of modern enterprises. In this issue of CW ASEAN, we take a look at how enterprises are taking to all-flash array storage, and what they need to do to lay the foundation necessary for getting the most out of the technology. Read the issue now.

  • Jargon Buster Guide to Post Quantum Cryptography

    Sponsored by: TechTarget ComputerWeekly.com

    This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.

  • Data protection: Not just about personal data and compliance

    Sponsored by: TechTarget ComputerWeekly.com

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

  • 19 machine learning interview questions and answers

    Sponsored by: TechTarget ComputerWeekly.com

    Aspiring machine learning job candidates should be fluent in varied aspects of machine learning, from statistical theory and programming concepts to general industry knowledge. Read our list of commonly asked machine learning questions and accompanying answers to help you prepare for your interview.

  • CW APAC - May 2021: Buyer's guide to HR software

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on HR software in the Asia-Pacific region, Computer Weekly looks at the considerations when choosing a human resource management application

  • AWS Re:Invent 2019: What CIOs need to know from this year's show

    Sponsored by: TechTarget ComputerWeekly.com

    The Amazon Web Services (AWS) Re:Invent user conference saw 65,000 users, developers and business leaders convene in Las Vegas to hear news about the firm's innovation priorities. In this e-guide, we provide a round-up of all the big stories and announcements from this year's Re:Invent, and give readers some clues as to where AWS is heading next.

  • CW ANZ – September 2018: Get to grips with DevOps

    Sponsored by: TechTarget ComputerWeekly.com

    The burgeoning DevOps culture in Australia has attracted new market players and led major companies to embrace the movement to get development and operations teams working in unison.

  • CISO Success Stories: How security leaders are tackling evolving cyber threats

    Sponsored by: TechTarget ComputerWeekly.com

    The cyber threat landscape facing chief information security officers (CISOs) has morphed into a rapidly evolving beast, fuelled by the breakneck pace of digital transformation. In this e-guide, delve into the unique pressures faced by CISOs in technology and other industries, and how they are rising to the challenge.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.