ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • A Computer Weekly e-guide to WAN & applications services

    Sponsored by: TechTarget ComputerWeekly.com

    One of the key technology trends of the last five years, if not longer, has been the migration from networks based on multiprotocol label switching (MPLS) to the more agile and affordable alternative, wide-area networking (WAN) technologies and in particular software-defined (SD-WAN).

  • MicroScope – October 2019: What's next for the channel?

    Sponsored by: MicroScope

    The fourth quarter is the busiest in the channel, and we get an idea of which technologies should be selling strongly

  • MicroScope – January 2021: Looking forward to the future

    Sponsored by: MicroScope

    In this issue of MicroScope, take a look at what the year ahead holds for the channel after a largely positive 2020. Also discover why IAM technology is so important for post-pandemic cloud computing, and what approaches are fundamental to finding business success

  • The last mile to the individual customer: Sales and marketing software trends

    Sponsored by: TechTarget ComputerWeekly.com

    From this e-guide you will learn about such developments in sales and marketing enterprise software in 2018, with a view to 2019 – from Computer Weekly and from our specialist US TechTarget site SearchCRM.

  • Putting NIS2 into Context

    Sponsored by: Sonatype

    The EU's updated cybersecurity legislation, NIS2, strengthens security requirements for critical infrastructure. Learn how the Sonatype platform can help organizations address NIS2 compliance challenges and enhance software development processes. Read the 7-page white paper.

  • Computer Weekly – 9 April 2019: Using data science at Sainsbury's

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to retailer Sainsbury's about its data science strategy and how it helps the firm better understand customers. We take a detailed look at the evolution of the business intelligence market. And we find out how simulated disaster management can tackle the security skills gap. Read the issue now.

  • 4 Considerations for Standardizing on a Linux Platform

    Sponsored by: Red Hat

    To manage increasingly complex IT challenges and stay competitive, it is critical organizations choose a Linux platform that can support innovation, streamline operations and drive long-term business value. Open this white paper to explore 4 considerations that will help determine the right Linux operating system for your company.

  • Security Think Tank: Critical National Infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.

  • Computer Weekly – 13 June 2017: Tips for buying hyper-converged systems

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends.

  • Power Of The Platform

    Sponsored by: ServiceNow

    How can you empower your customers, employees, and partners with modern, consumer-grade experiences? Read on to learn how the Now Platform can help you break down silos, seamlessly connecting your people, systems and processes with enterprise-wide digital workflows while increasing speed to value.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.