ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Overcoming Data Challenges for Innovation in Financial Services through 360-degree Business Solutions from InterSystems

    Sponsored by: InterSystems

    Consider the challenges and barriers (such as silos and time-intensive data validation processes) to effective financial services data management in this InContext Paper by Bloor. You’ll also understand how InterSystems Financial Services Solution Suite resolves these issues with a 360-degree view of enterprise and customer data.

  • CW EMEA - January 2023: Protecting the privacy of schoolchildren

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.

  • Event recap: VMworld 2018 Europe

    Sponsored by: TechTarget ComputerWeekly.com

    It is the 20th anniversary year for VMware and at the VMware European conference in Barcelona, the company famous for its hypervisor, showcased how it had changed the face of IT, and where it was heading next.

  • 2023 IT Priorities APAC Report

    Sponsored by: TechTarget ComputerWeekly.com

    IT leaders across APAC remain bullish about IT spending despite macroeconomic headwinds as they continue to invest in strategic areas such as cyber security, automation and cloud computing to bolster their digital chops.In this e-guide, read more about the findings revealed by the latest TechTarget/Computer Weekly IT Priorities 2023 study.

  • A Computer Weekly buyer's guide to data protection

    Sponsored by: TechTarget ComputerWeekly.com

    Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.

  • Computer Weekly – 8 November 2022: How the US-China chip war will affect IT leaders

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the US ramps up semiconductor sanctions on China, we examine the ramifications across the tech sector. Cyber criminals are turning to new forms of encryption – we talk to the Dutch researchers trying to catch them. And we look at what cloud providers need to do to improve customer experience. Read the issue now.

  • Shore up your cybersecurity resilience: A guide for ANZ businesses

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.

  • Next step app development: Microservices

    Sponsored by: TechTarget ComputerWeekly.com

    Adopting a microservices approach to application development is increasingly considered an essential part of any bid to modernise the legacy IT setup an organisation relies on.

  • Developing A Strategy For Your Network Modernization

    Sponsored by: Cloudflare

    Evaluate the scope of your network modernization project, and consider key use cases like branch connectivity, protecting public-facing infrastructure, simplifying the corporate network, and connecting, and securing public clouds.

  • The Hidden Costs of Downtime

    Sponsored by: Splunk

    Downtime and service degradation create a cascade of consequences, costing Global 2000 companies $400B annually. Learn how the most resilient organizations set themselves apart from the rest and Splunk’s recommendations for deterring downtime in this first-of-its-kind report in partnership with Oxford Economics.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.