ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • 3 Steps To Creating Enterprise Value With Generative AI

    Sponsored by: Teradata

    While there are a variety of strategies for unlocking the potential of AI, 3 emerging use cases stand out as high-value investments that can help organizations maximize their AI capabilities. Read on to learn about 3 steps you can take to establish powerful AI strategies for your business.

  • Middle East IT Priorities 2017

    Sponsored by: TechTarget ComputerWeekly.com

    This year's Computer Weekly and TechTarget IT Priorities survey has revealed that over half of IT decision makers at Middle East based organisations are planning on reducing how much they send of IT staff, despite the growing importance of IT to business.

  • MicroScope – October 2021: Choosing a channel career

    Sponsored by: MicroScope

    In this issue, we explore whether more partners equals better business, and take a closer look at how IT consumption is changing thanks to subscription services. Also read a special feature looking into whether the channel offers good prospects for school-leavers hoping to start on a career path that could make a difference

  • Serverless computing: What enterprises need to know

    Sponsored by: TechTarget ComputerWeekly.com

    As the use of public cloud services has gathered steam within enterprises, so too has interest among IT leaders about embracing the principles of serverless computing. In this e-guide we take a closer look at the benefits and pitfalls of serverless, while shining a light on the ways that enterprises across the globe are putting it to use.

  • Market Study Contact center of 2030

    Sponsored by: Foundever

    Contact center leaders expect major transformations by 2030, including cloud-based platforms, remote workforces, and data-driven decisions. Discover the key findings and action plans for the contact center of the future in this exclusive market study.

  • The Spreadsheet User’s Guide to Modern Finance Analytics

    Sponsored by: Alteryx

    As financial data grows in volume and complexity, the limits of spreadsheets become more obvious — they are manual, time-consuming, decentralized, and prone to human error. Read this e-book now to discover how to take the spreadsheet skills you already have and add the repeatability, speed, and security of analytics automation.

  • Spreadsheet User's Guide to Modern Finance Analytics

    Sponsored by: Alteryx

    Spreadsheets have long been the go-to tool for finance, but as data grows, their limitations—manual, time-consuming, decentralized, and error-prone—become clear.That's why 50% of users are exploring more advanced analytical solutions. Access this e-book to learn more.

  • Computer Weekly - 7-13 January 2020: Digital fashion reality - how technology can help people enjoy fashion in a more sustainable way

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we report on a programme to get more young women into cyber security. We look at fashion for online personas. And we examine edge computing as the new data frontier, and how cloud-native platforms and AI might transform the datacentre. Read the issue now.

  • CIO Trends #7

    Sponsored by: TechTarget ComputerWeekly.com

    Read some of our most popular articles on issues faced by IT decision makers, such as how to get the most out of the internet of things, and how to tailor your IT operating model to fit in the digital age.

  • Computer Weekly – 8 August 2017: Formula 1 goes digital

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how Formula 1 chief Ross Brawn is turning to digitization to enhance the fan experience of Grand Prix racing. We also learn how virtual reality is being used to deliver healthcare services. And our experts examine the ethical concerns around artificial intelligence. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.