Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
Computer Weekly - 16 July 2019: Reaping the benefits of digital transformation at Defra
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we check out the digital transformation at Defra, and see how the government department is preparing for Brexit. The new technology chief for the NHS explains how he's going to bring the health service into the digital age. And we examine how to make a success of enterprise social media platforms. Read the issue now.
-
Cloud-Native Meets Hybrid Cloud: A Strategy Guide
Sponsored by: Red HatAs technologies evolve, organizations need to adopt new strategies to achieve success. This guide is designed as a strategy primer for enterprise architects and IT leaders to map out how to tackle modern IT strategy, focusing on the most important key trends. Read now to learn more.
-
Identity and Access Management Is Leading the Way for Identity Security
Sponsored by: CyberArkIn recent years, Identity and Access Management has rapidly evolved. Learn how your organization can keep up with these changes by exploring automation, overcoming identity security challenges in the cloud and what investing in modern identity solutions looks like.
-
19 machine learning interview questions and answers
Sponsored by: TechTarget ComputerWeekly.comAspiring machine learning job candidates should be fluent in varied aspects of machine learning, from statistical theory and programming concepts to general industry knowledge. Read our list of commonly asked machine learning questions and accompanying answers to help you prepare for your interview.
-
Computer Weekly –11 April 2017: Virtual reality in healthcare
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how virtual reality technology is starting to be used to improve healthcare. We examine the new tax laws that are causing IT contractors to quit government digital projects. And we analyse the software licensing issues arising from SAP's recent court case over indirect access. Read the issue now.
-
Preventing identity theft in a data breach
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
-
Innovate With Automation A Red Hat Customer Success Series
Sponsored by: Red HatThis collection of customer success stories explores how organizations across industries used Red Hat Ansible Automation Platform to address challenges, boost efficiency, and drive innovation. Learn how automation can help your organization unify people, processes, and technology. Read the success stories.
-
Payouts Forecasting Stock Returns With Buyback And Dividend Expectations
Sponsored by: S&P GlobalThis white paper analyzes how buybacks and dividends have become the preferred method of shareholder payouts. It shows that aggregate payout yield expectations can predict future market returns. Download the full report to learn how payout expectations can be used for stock selection and portfolio construction.
-
Customer Experience Intelligence Report IN
Sponsored by: ServiceNow66% of customers consider taking their business elsewhere when an issue is not resolved within 3 days. This can be problematic, given the average of 3.9 days for companies to resolve a problem, and tends to lead to customers switching brands. So, what can organisations do to improve their customer service? Browse this report to learn more.
-
MicroScope - September-October 2024: Embracing the AI opportunity
Sponsored by: MicroScopeIn this issue, we look at how the channel is reacting to AI, share advice for those looking to harness the technology, and explore how MSPs can help customers to optimise generative AI investments