ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=10"

  • Computer Weekly – 15 November 2022: How to protect against ransomware attacks

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how to prepare for and protect against ransomware, and what to do if you're hit by an attack. We gauge industry reaction to Ofcom's plan to investigate the big three cloud providers. And we find out how travel giant TUI is implementing self-service analytics. Read the issue now.

  • Computer Weekly – 25 October 2022: The Most Influential Women in UK Technology 2022

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal our annual list of the 50 Most Influential Women in UK Technology. We talk to the No.1 on the list, Flavilla Fongang, about how to improve diversity and inclusion in the sector. And we introduce our seven rising stars – the future female leaders of UK IT. Read the issue now.

  • Top 10 datacentre stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    There is nothing like a datacentre outage to highlight just how reliant the digital economy is on these facilities, with the 2018 news cycle dominated by tales of server rooms going awry and causing mass disruption to end users across the globe. Here's a look back over Computer Weekly's top 10 datacentre stories of 2018.

  • UKTech50 2021 - The most influential people in UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: Computer Weekly has announced the 11th annual UKtech50, our definitive list of the movers and shakers in UK technology – the CIOs, industry executives, public servants and business leaders driving the role of technology in the UK economy.

  • The Real Value Of Technology Connectivity

    Sponsored by: TeamViewer

    This report explores how technology connectivity drives business benefits like improved efficiency, collaboration, and innovation. It finds that seamless connectivity remains elusive for most organizations, with 95% having gaps to close. Read the full report to learn how to maximize the value of technology connectivity.

  • Top 10 cloud stories 2018

    Sponsored by: TechTarget ComputerWeekly.com

    While cloud has established itself as the preferred way for many enterprises to consume IT resources, organisations in some vertical markets have taken markedly longer to come round to its charms. With this as a backdrop, Computer Weekly takes a look at the top 10 cloud stories of 2018.

  • Computer Weekly – 6 March 2018: Getting up to speed with 5G

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at what needs to be done to make next-generation 5G mobile networks a reality. Fewer EU workers are moving to the UK – we examine what that means for the IT skills gap. And we analyse the state of the hyper-converged infrastructure market. Read the issue now.

  • Sustainability at the Edge

    Sponsored by: Schneider Electric

    There is a yawning gap between enterprise perceptions and sustainability initiative realities. So how can your organization bridge the gap? Find out in this research report.

  • Sustainability at the Edge

    Sponsored by: Schneider Electric

    Enterprises are increasingly including distributed IT and edge infrastructure in their sustainability programs, with over 80% having or planning a program within 12 months – but optimizing energy use and obtaining consistent data are key challenges. Read on to learn how enterprises can track metrics and improve their environmental impact.

  • 10 AI and machine learning use cases in ITSM

    Sponsored by: TechTarget ComputerWeekly.com

    AI-enabled ITSM, while still maturing, promises to greatly improve the speed and quality of IT service management. Here are 10 AI and machine learning use cases for ITSM

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.