ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=10"

  • CW APAC: Expert Advice on data management

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how companies and data management experts are tackling data challenges, and finds out how organisations are augmenting data management through artificial intelligence and machine learning.

  • Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.

  • CW Europe – March-May 2019: Robots deliver savings for Dutch postal service PostNL

    Sponsored by: TechTarget ComputerWeekly.com

    European businesses have bought into the digital revolution, with the adoption of the latest technologies like automation enabling companies to transfer their internal operations.

  • Webinar Series for ABM: An 8-Step Planning Framework

    Sponsored by: BrightTALK by TechTarget

    Account-based marketing (ABM) has become a popular strategy within the B2B tech space, especially as B2B marketers look to better align with the way Sales operates. Yet some argue that ABM program success has been mixed or even underwhelming at times. Access this e-book to learn more.

  • How to Evaluate Threat Intelligence Feeds

    Sponsored by: ReversingLabs

    Know When Software Is Malware. With this guide, you will learn how to evaluate open source and commercial threat intelligence feeds to ensure you have relevant and useful information about malware, ransomware, Indicators of Compromise (IoC) and threat actors, so that your team can identify malicious events and reduce noisy, time-consuming alerts.

  • Top 10 Policies Every IT Compliance Certification Requires

    Sponsored by: Scalepad Software

    A key factor in job satisfaction is eliminating manual, tedious tasks—like backup monitoring—so your team can focus their efforts on projects of greater business value. Download this white paper to view 5 tangible benefits of automated backup monitoring, applicable to your organization, MSPs, and others.

  • Top Priority IT Tasks: Risk Management and Regulatory Compliance

    Sponsored by: Dell Software

    In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.

  • The Role of Mobile Engagement: Insights from Healthcare Leaders

    Sponsored by: Gozio Health

    Download this report to find out what nearly 275 healthcare executives think about the state of mobile experience in healthcare.

  • Computer Weekly - 4 May 2021: How KFC put digital on the menu

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how fast-food chain KFC turned to digital to survive the pandemic. Our latest buyer's guide looks at technologies to improve office productivity for home workers. And we assess the growing problem of electronic waste and how to tackle it. Read the issue now.

  • CW EMEA – August 2023: Helsinki's Aalto University: Where ideas take off

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of CW EMEA, we look at the startup scene in Finland. Every startup needs a starting place, and many Finnish innovators began at Aalto University. We also look at how the Gulf region is seeing some of the heaviest investments in the latest technology as countries diversify their economies to reduce reliance on oil. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.