ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • CW Europe – September-November 2017

    Sponsored by: TechTarget ComputerWeekly.com

    In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years.

  • 7 characteristics of next-generation networking

    Sponsored by: TechTarget ComputerWeekly.com

    The term next-generation networking refers to the process of designing network infrastructure with new, advanced technologies. Next-generation networks are flexible, nimble and secure architectures that are easier to manage. In this article, analysts offer their perspectives on which technologies help modernize network infrastructures.

  • Who should get the technology vote in the UK General Election?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we take an in-depth look at the technology and digital policies in the main political parties' election manifestos. We examine the rise of alternatives to relational databases that better support a big data environment. And we assess the security issues around container technology. Read the issue now.

  • Build a Better Webinar: Running Virtual Events

    Sponsored by: BrightTALK by TechTarget

    Download Build a Better Webinar: Running Virtual Events,where you can discover BrightTALK's years of expertise executing for their clients to share foundationalvirtual event best practices. From determining the theme of your event to evaluating event performance,you'll walk away with a clear roadmap to build and execute a successful virtual event.

  • Preparing For 2027: Driving Health Equity With Inclusive Member Education

    Sponsored by: Wolters Kluwer

    As healthcare shifts to address equity, payers must collect data, engage members, and collaborate with providers to meet new CMS Health Equity Index requirements by 2027. Learn strategies to prepare and drive better outcomes in this white paper.

  • Red Hat Ansible Automation Platform A beginners guide

    Sponsored by: Red Hat

    80% of organizations say that adopting IT automation is “extremely important” to the future success of their organization, according to Harvard Business Review. This white paper serves as a guide for the Red Hat Ansible Automation Platform. Dive into the guide today.

  • Customer service technologies emerge bloodied but unbowed from Covid-19 pandemic

    Sponsored by: TechTarget ComputerWeekly.com

    The pandemic caused many businesses to reassess their approach to customer experience. Customers were changing their behaviour, their channels, their brands and suppliers and organisations had to adapt. Download this exclusive e-guide and read more about the transformative impact of the pandemic on customer service and experience.

  • Top 10 Reasons Customers Migrate & Modernize Microsoft Workloads with SourceFuse on AWS

    Sponsored by: AWS

    This paper provides answers to the top 10 questions customers have when running Microsoft workloads on AWS—ranging from the key benefits AWS offers, to the licensing, migration, and optimization options for your Windows Server, SQL Server, and .NET workloads.

  • CW EMEA – October 2023: Prepare for AI explosion

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's CW EMEA, we look at generative AI, which Accenture claims is the next big thing in enterprise IT. We also look at a demo of multi-supplier non-real-time RAN optimisation, a Ryder Cup tech testbed, and how Zurich Insurance has cut the time it takes to develop ServiceNow apps. Read the issue now.

  • Full visibility and real-time threat response: Helping retailers achieve proactive IT Security

    Sponsored by: Tanium

    Hackers are targeting blind spots and vulnerabilities in the complex, multi-tooled IT systems that retailers depend on. And rather than physical goods, threat actors are stealing valuable data. Discover how adopting a converged endpoint management solution with full visibility of assets can help retailers mitigate and prevent data breaches.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.