ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Middle East focus: Moving to the cloud

    Sponsored by: TechTarget ComputerWeekly.com

    According to Gartner, companies in the Middle East are set to spend almost $2bn on moving systems to the cloud by 2020, so it is important they understand the challenges to avoid wasting money.

  • Computer Weekly – 23 October 2018: Where next for digital identity?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the government hands its digital identity service, Gov.uk Verify, to the private sector, we examine the history and prospects for the troubled system. Our latest buyer's guide looks at cloud-native architecture. And we compare the flash storage capabilities of the leading cloud providers. Read the issue now.

  • The ultimate guide to identity & access management

    Sponsored by: TechTarget ComputerWeekly.com

    Businesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.

  • Computer Weekly – 12 February 2019: The Met Office storms ahead on data analytics

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, find out how the Met Office takes 2TB of weather data every hour and turns it into useful business insight. We examine whether Amazon's presence in the retail market is putting off other retailers from using its public cloud services. And we look at the new 802.11ax wireless networking standard. Read the issue now.

  • Computer Weekly - 7 December 2021: Spy tech gets high tech – why MI6 invests in startups

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we're used to James Bond and his gadgets, but now MI6 is investing in tech startups to develop new intelligence capabilities. Our exclusive IT Priorities survey suggests IT leaders are optimistic about 2022. And our new buyer's guide examines the latest emerging technologies. Read the issue now.

  • Unlocking Value with Foundation Models

    Sponsored by: AWS

    In collaboration with Anthropic, hear what the most common telco use cases with Anthropic on AWS are and see how SK Telecom, T-Mobile US, Telia Company, COX and Globe Telecom are using generative AI on AWS to unlock value.

  • Ultimate guide to digital transformation for enterprise leaders

    Sponsored by: TechTarget ComputerWeekly.com

    This in-depth guide explains what digital transformation is, why it is important and how enterprises can successfully transition to this new business paradigm.

  • Computer Weekly - 28 July 2020: Meet the CIO connecting IT in the most inhospitable environmentsts

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we discuss the challenges of running global IT in the world of copper mining. We look at how tech vendors are adapting their products to meet the lockdown demands of working from home. And we examine how zero-trust methods can help secure container technology. Read the issue now.

  • Computer Weekly - 28 July 2020: Meet the CIO connecting IT in the most inhospitable environments

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we discuss the challenges of running global IT in the world of copper mining. We look at how tech vendors are adapting their products to meet the lockdown demands of working from home. And we examine how zero-trust methods can help secure container technology. Read the issue now.

  • Computer Weekly – 7 May 2024: Casting a critical eye on HMRC's IR35 checker tool

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we investigate what has been going on with the HMRC's Check Employment Status for Tax (CEST). We also speak to the CIO of Danfoss about making datacentres greener and explore the issue of restoring data and system backups after a ransomware or cyber attack. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.