ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Computer Weekly - 16 July 2019: Reaping the benefits of digital transformation at Defra

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we check out the digital transformation at Defra, and see how the government department is preparing for Brexit. The new technology chief for the NHS explains how he's going to bring the health service into the digital age. And we examine how to make a success of enterprise social media platforms. Read the issue now.

  • Cloud-Native Meets Hybrid Cloud: A Strategy Guide

    Sponsored by: Red Hat

    As technologies evolve, organizations need to adopt new strategies to achieve success. This guide is designed as a strategy primer for enterprise architects and IT leaders to map out how to tackle modern IT strategy, focusing on the most important key trends. Read now to learn more.

  • Identity and Access Management Is Leading the Way for Identity Security

    Sponsored by: CyberArk

    In recent years, Identity and Access Management has rapidly evolved. Learn how your organization can keep up with these changes by exploring automation, overcoming identity security challenges in the cloud and what investing in modern identity solutions looks like.

  • 19 machine learning interview questions and answers

    Sponsored by: TechTarget ComputerWeekly.com

    Aspiring machine learning job candidates should be fluent in varied aspects of machine learning, from statistical theory and programming concepts to general industry knowledge. Read our list of commonly asked machine learning questions and accompanying answers to help you prepare for your interview.

  • Computer Weekly –11 April 2017: Virtual reality in healthcare

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how virtual reality technology is starting to be used to improve healthcare. We examine the new tax laws that are causing IT contractors to quit government digital projects. And we analyse the software licensing issues arising from SAP's recent court case over indirect access. Read the issue now.

  • Preventing identity theft in a data breach

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.

  • Innovate With Automation A Red Hat Customer Success Series

    Sponsored by: Red Hat

    This collection of customer success stories explores how organizations across industries used Red Hat Ansible Automation Platform to address challenges, boost efficiency, and drive innovation. Learn how automation can help your organization unify people, processes, and technology. Read the success stories.

  • Payouts Forecasting Stock Returns With Buyback And Dividend Expectations

    Sponsored by: S&P Global

    This white paper analyzes how buybacks and dividends have become the preferred method of shareholder payouts. It shows that aggregate payout yield expectations can predict future market returns. Download the full report to learn how payout expectations can be used for stock selection and portfolio construction.

  • Customer Experience Intelligence Report IN

    Sponsored by: ServiceNow

    66% of customers consider taking their business elsewhere when an issue is not resolved within 3 days. This can be problematic, given the average of 3.9 days for companies to resolve a problem, and tends to lead to customers switching brands. So, what can organisations do to improve their customer service? Browse this report to learn more.

  • MicroScope - September-October 2024: Embracing the AI opportunity

    Sponsored by: MicroScope

    In this issue, we look at how the channel is reacting to AI, share advice for those looking to harness the technology, and explore how MSPs can help customers to optimise generative AI investments

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.