ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=10"

  • CW Nordics - February-April 2022: Swedish drone app gets life-saving equipment to heart attack victims

    Sponsored by: TechTarget ComputerWeekly.com

    Thanks to an app developed in Sweden, drones can get life-saving equipment to heart-attack victims before emergency services can arrive on the scene, potentially increasing patient survival rates. Also in this issue, read about a Swedish bank's time-saving robots.

  • Think Big, Start Small, Scale Fast: The Data Engineering Workbook

    Sponsored by: HighByte

    In this interactive workbook, you’ll discover 10 steps accompanied by some brief questions that are designed to help industrial leaders learn how they can leverage data engineering strategies to get the most out of their data. Read on to learn how you can unlock hidden business value.

  • CW Nordics August 2017

    Sponsored by: TechTarget ComputerWeekly.com

    The Nordic region, known for its startup companies, is a good platform for fintech companies to set up as consumers are conducive to digital banking services. In this issue, discover how major companies in the financial industry are partnering with startups and launching fintech initiatives and much more.

  • Computer Weekly – 10 October 2017: The most influential women in UK IT

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal our annual list of the 50 most influential women in UK technology, and interview this year's winner – investor and entrepreneur Sherry Coutu – to learn her thoughts on how to improve diversity in the IT workforce. Read the issue now.

  • Channels to Managed Print Services in Europe

    Sponsored by: TechTarget ComputerWeekly.com

    Analyst group Quocirca reviews channel-led managed print services (MPS) programmes.

  • Top 10 IT security stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

  • Computer Weekly – 7 August 2018: How digital is driving golf to the connected course

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how one of the most traditional of sports, golf, is turning to technology to engage a new audience and build the connected course. Industry legend Stephanie 'Steve' Shirley discusses skills, diversity in tech and Brexit fears. And we assess four of the biggest cloud storage providers. Read the issue now.

  • Put Windows 11 at the center of your security strategy

    Sponsored by: Assembly Global

    Cyber attacks are more prevalent than ever, with a reported spike of over 200% since 2023. To ensure you're less likely to fall victim to sinister efforts, there are simple measures at your disposal right now. It's time to amplify Windows 11 benefits with the power of the Lenovo Think ecosystem. Read the full article now to learn more.

  • CW Benelux ezine February 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.

  • E-government benchmark 2016

    Sponsored by: TechTarget ComputerWeekly.com

    The results of the latest e-government benchmark show a cautious acceleration of e-government implementation in Europe.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.