ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • A Computer Weekly buyer's guide to video conferencing and collaboration

    Sponsored by: TechTarget ComputerWeekly.com

    In this 17-page buyer's guide, Computer Weekly looks at how employers can support a future of flexible working, with video conferencing, collaboration, augmented reality and unified comms technologies all lined up to play a part.

  • Master Data Management Solution Selection Guide

    Sponsored by: Semarchy

    This guide is aimed at helping you select a Master Data Management (MDM) solution that is best for the scope, context, and identified requirements you need. Read on to learn how you can avoid the trap of only relying on generic analyst ranking reports that consider a lot of capabilities but may not be relevant to your bottom line.

  • Computer Weekly - 16 July 2019: Reaping the benefits of digital transformation at Defra

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we check out the digital transformation at Defra, and see how the government department is preparing for Brexit. The new technology chief for the NHS explains how he's going to bring the health service into the digital age. And we examine how to make a success of enterprise social media platforms. Read the issue now.

  • CIO Trends #4: Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    Read analysis of some of the Nordic results from the Computer Weekly IT priorities survey for this year. Unsurprisingly, cloud computing is one of the biggest draws and more than half of CIOs in the region will spend more on cloud technologies this year than they did in 2016.

  • Top 10 Reasons Customers Migrate & Modernize Microsoft Workloads with SourceFuse on AWS

    Sponsored by: AWS

    This paper provides answers to the top 10 questions customers have when running Microsoft workloads on AWS—ranging from the key benefits AWS offers, to the licensing, migration, and optimization options for your Windows Server, SQL Server, and .NET workloads.

  • Computer Weekly - 20 December 2022: The Post Office IT scandal - cock-up or cover-up?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the Post Office IT scandal inquiry continues to reveal shocking details – we review the latest evidence. We examine progress of the roll-out of fast broadband across the UK. And as the Online Safety Bill returns to Parliament, we look at the arguments about how to keep the internet safe. Read the issue now.

  • Protecting the IT attack surface while advancing digital transformation

    Sponsored by: Tanium

    To survive and to thrive, organizations must continue innovating, launching new products and services, and optimizing old ones. As a result, every organization’s attack surface will continue to change and, likely, grow. Learn how business leaders can keep up with these changes in this latest technical deep dive from Tanium experts.

  • CW Benelux ezine February 2017

    Sponsored by: TechTarget ComputerWeekly.com

    In this quarter's CW Benelux ezine, we ask whether the Netherlands is suffering from digital delusion and if it is losing ground in the digital world.

  • The IT Automation Imperative

    Sponsored by: Red Hat

    Automation is now mission-critical for modern IT. This e-book from Red Hat explores how enterprises can leverage Ansible Automation Platform to fill skill gaps, maximize IT investments, and achieve substantial business value. Read the full report to learn more.

  • Cloud-Native Meets Hybrid Cloud: A Strategy Guide

    Sponsored by: Red Hat

    As technologies evolve, organizations need to adopt new strategies to achieve success. This guide is designed as a strategy primer for enterprise architects and IT leaders to map out how to tackle modern IT strategy, focusing on the most important key trends. Read now to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.