ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • IT Project: DevOps

    Sponsored by: TechTarget ComputerWeekly.com

    2016 is widely tipped to be the year DevOps goes mainstream, with enterprise IT managers either looking to ramp up or kick-start their efforts in this area, and start realising the benefits it can bring.

  • Computer Weekly – 12 February 2019: The Met Office storms ahead on data analytics

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, find out how the Met Office takes 2TB of weather data every hour and turns it into useful business insight. We examine whether Amazon's presence in the retail market is putting off other retailers from using its public cloud services. And we look at the new 802.11ax wireless networking standard. Read the issue now.

  • Service Experience: The Next Value Driver for Global Business Services

    Sponsored by: ServiceNow

    This guide sets forth a roadmap to begin the GBS experience journey based upon the lessons learned from several pioneering organizations.

  • Unlocking AI’s Potential: Accelerating the AI Adoption Journey

    Sponsored by: Oracle

    As companies continue to implement AI, some have been experiencing a lack of quality data and skills as well as cost, security, and privacy concerns due to the AI they’ve implemented. So, what steps can you take to ensure that you can combat these challenges and accelerate your adoption? Dig into this guide to learn more.

  • Middle East focus: Moving to the cloud

    Sponsored by: TechTarget ComputerWeekly.com

    According to Gartner, companies in the Middle East are set to spend almost $2bn on moving systems to the cloud by 2020, so it is important they understand the challenges to avoid wasting money.

  • Computer Weekly – 23 October 2018: Where next for digital identity?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the government hands its digital identity service, Gov.uk Verify, to the private sector, we examine the history and prospects for the troubled system. Our latest buyer's guide looks at cloud-native architecture. And we compare the flash storage capabilities of the leading cloud providers. Read the issue now.

  • Computer Weekly - 7 December 2021: Spy tech gets high tech – why MI6 invests in startups

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we're used to James Bond and his gadgets, but now MI6 is investing in tech startups to develop new intelligence capabilities. Our exclusive IT Priorities survey suggests IT leaders are optimistic about 2022. And our new buyer's guide examines the latest emerging technologies. Read the issue now.

  • Application security: More important than ever

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.

  • Risk management is the beating heart of your cyber strategy

    Sponsored by: TechTarget ComputerWeekly.com

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.

  • Computer Weekly – 7 May 2024: Casting a critical eye on HMRC's IR35 checker tool

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we investigate what has been going on with the HMRC's Check Employment Status for Tax (CEST). We also speak to the CIO of Danfoss about making datacentres greener and explore the issue of restoring data and system backups after a ransomware or cyber attack. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.