ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Kubernetes Backup, Dr, & App Mobility With Kasten K10

    Sponsored by: Zadara Storage

    Protect Kubernetes data with an integrated, validated solution from Zadara and Kasten by Veeam. Secure your cloud-native applications with comprehensive backup, DR, and app mobility. Learn how this unified data management solution can simplify operations and reduce risk. Read the full overview.

  • Computer Weekly – 13 April 2021: The evolution of RPA

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at the future of robotic process automation (RPA). Google's legal victory against Oracle over the use of Java APIs has huge significance for software developers. And we find out how expectations of IT have grown as firms prepare for the post-Covid workplace. Read the issue now.

  • CW Europe – September-November 2017

    Sponsored by: TechTarget ComputerWeekly.com

    In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years.

  • The Cycle of Healthcare Data: Creation, Gathering, and Handling

    Sponsored by: XtelligentMedia Healthcare

    Understanding data generation, collection, and processing can guide stakeholders looking to tackle various data analytics projects in healthcare.

  • Four Ways to be More Innovative with RISE with SAP

    Sponsored by: Lemongrass

    In this e-book, explore 4 technologies that can help you reach your cloud goal and are only available in RISE with SAP in most cases. Be sure to consider them in your plans to take your SAP migration to new heights.

  • Pre-Webinar Checklist

    Sponsored by: BrightTALK by TechTarget

    From doctors to airline pilots, checklists are crucial to success for even the most skilled professionals. By following these simple best practices you can create a smooth webinar experience that will improve your program success. Download your copy of the “Pre-Webinar Checklist,” to get started.

  • A Computer Weekly buyer's guide to application modernisation

    Sponsored by: TechTarget ComputerWeekly.com

    In this 15-page buyer's guide, Computer Weekly investigates how organisations are approaching the modernisation, replatforming and migration of legacy applications. We look at the tools and technologies available, change management, and the use of APIs and containerisation to make legacy functionality to cloud-native applications.

  • Industry Trends and Assets to Watch Based on ASCO 2024

    Sponsored by: Intelligencia AI

    The American Society of Clinical Oncology (ASCO) Annual Meeting ranks as one of the largest and most impactful oncology conferences. The content published during the annual meeting can change established practices, and many of the trends identified reflect the current or future industry landscape in oncology.

  • CW APAC, April 2021: Trend Watch: IoT in India

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on the internet of things in India, Computer Weekly looks at the country's potential as an IoT hotspot.

  • CW Middle East April-June 2020: Quarter of Middle East businesses have no women in IT

    Sponsored by: TechTarget ComputerWeekly.com

    The Middle East faces fierce competition for IT professionals with the right skills, so it is so worrying that the region's women are so underrepresented in the IT community. In fact over quarter of businesses in the Middle East have no women in their IT departments, according to Computer Weekly's Salary Survey.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.