ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=10"

  • Getting the best out of robotic process automation

    Sponsored by: TechTarget ComputerWeekly.com

    IT leaders are used to doing more with less, but the pandemic has forced many organisations to reassess whether the way processes have always been run, is optimal. With people having to work from home, many organisations have needed to automate previous manual tasks, in order to remain operational.

  • CIO Trends #11: Benelux

    Sponsored by: TechTarget ComputerWeekly.com

    The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.

  • CIO Trends #11: Benelux

    Sponsored by: TechTarget ComputerWeekly.com

    The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.

  • Fraud management: A perennial business issue

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.

  • A Computer Weekly Buyer's Guide to Hyperautomation and Bots

    Sponsored by: TechTarget ComputerWeekly.com

    The advantages of bots are only multiplying for businesses across the globe. In this 15-page buyer's guide, Computer Weekly looks at how robotic process automation is evolving, the benefits it brings for coders and the ways artificial intelligence can enhance customer service.

  • Converged infrastructure: What enterprises need to know

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we round up some of the latest thinking and use cases for converged and hyper-converged infrastructure systems, as enterprises and hyperscale firms seek to reduce the complexity of their datacentres.

  • Top 10 cyber security stories of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.

  • Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.

  • How Extole Exceeded Expectations for Cloud Cost and Resource Optimization with Pepperdata

    Sponsored by: Pepperdata

    In this case study, you'll discover how Extole exceeded cloud cost and resource optimization expectations with Pepperdata. Read on now to learn how they were able to take control of their complex cloud infrastructure costs.

  • Computer Weekly – 11 July 2017: The data analytics behind the Wimbledon tennis championships

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the All England Lawn Tennis Club is working with IBM to use data analytics to engage with fans of the Wimbledon championships. We examine whether IT automation will kill jobs or solve the skills gap. And we look at the issues around data portability in the cloud. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.