ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Supercharging Employee Growth and Development

    Sponsored by: ServiceNow

    Business Leaders are finding that focusing on skills, rather than jobs or degrees, strengthens your workforce with modern data and insights. This paper presents four ways that a skills-powered approach can supercharge employee growth and development.

  • CISO Success Stories: How security leaders are tackling evolving cyber threats

    Sponsored by: TechTarget ComputerWeekly.com

    The cyber threat landscape facing chief information security officers (CISOs) has morphed into a rapidly evolving beast, fuelled by the breakneck pace of digital transformation. In this e-guide, delve into the unique pressures faced by CISOs in technology and other industries, and how they are rising to the challenge.

  • ITIL and ITSM: How IT is becoming more service-oriented

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we shine the light on the state of IT service management (ITSM) and the framework upon which it is effectively built, the IT Infrastructure Library (ITIL). We explore how ITSM is being changed by machine learning, how it can be used in the cloud and the datacentre, and the role ITIL could play in digital business transformation.

  • Transform your applications with Red Hat OpenShift Service on AWS

    Sponsored by: Red Hat

    Discover how to modernize your applications and IT operations with a hybrid cloud platform. Learn to rapidly build, deploy, and manage cloud-native apps across on-premises and cloud environments. Read the e-book to unlock new business possibilities.

  • How Healthcare IoT Resilience, Efficiency, and Security Impact Hospitals

    Sponsored by: Schneider Electric

    This white paper explores how resilience, efficiency, and security impact overall hospital operations and how IT professionals in healthcare environments can help their hospitals make major strides forward in their IoT and digital transformation. Read on to learn more.

  • MicroScope – March 2022: Taking the steady approach to becoming an MSP

    Sponsored by: MicroScope

    In this issue, take a closer look at the risks and pitfalls on the journey to becoming a manages services provider, read about expected ongoing change and consolidation in the year ahead, and discover what experts have to say on the skills and supply chain shortages

  • CW Benelux - November 2021-January 2022: Dutch IT company rips up the HR rule book for better work-life balance

    Sponsored by: TechTarget ComputerWeekly.com

    One Dutch tech firm has used learnings from the pandemic to rip up its HR rule book and implement an official work-from-home policy. In fact, Infolearn has gone further than hybrid working, with a personal mobility budget for staff and a four-day working week.

  • Computer Weekly – 26 March 2024: What are IT buyers spending their money on?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal the technologies that IT buyers are spending their money on this year. The European CIO at PepsiCo explains how to make digital transformation go with a pop. And we look at the growing importance of cloud-to-cloud backup for data protection and resilience. Read the issue now.

  • Computer Weekly – 16 August 2016: Barriers to UK datacentre expansion

    Sponsored by: TechTarget ComputerWeekly.com

    A TechUK survey has found that the UK tech sector's confidence of growth over the next two years has dropped by 23 points, due to Brexit. In this week's issue, we look at how Asian investors are pulling out of datacentre investments. According to datacentre analyst Broadgroup, these investors have been quite spooked by the Brexit vote.

  • Gigamon taps eBPF to inspect encrypted traffic with Precryption technology

    Sponsored by: Gigamon

    Network traffic monitoring faces challenges with encrypted traffic and hybrid cloud environments. Gigamon's Precryption technology leverages eBPF to inspect encrypted traffic before or after encryption, providing visibility without decryption. Read the full analyst report to learn more about this innovative approach.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.