ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Unlocking Value with Foundation Models

    Sponsored by: AWS

    In collaboration with Anthropic, hear what the most common telco use cases with Anthropic on AWS are and see how SK Telecom, T-Mobile US, Telia Company, COX and Globe Telecom are using generative AI on AWS to unlock value.

  • CW Benelux February-April 2020: Ericsson helps driverless buses hit European streets

    Sponsored by: TechTarget ComputerWeekly.com

    Ericsson reveals its plans for new technologies including 5G, the internet of things and automation, including driverless buses.

  • Focus: Private cloud

    Sponsored by: TechTarget ComputerWeekly.com

    The private cloud is often viewed as a stepping stone for enterprises keen to tap into the business agility benefits of cloud without ceding total control over where their applications and workloads run. For some organisations, such deployments act as a test bed environment, where they can work out where best to run their workloads.

  • Computer Weekly – 27 February 2018: How IT is taking UPS to new heights

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to UPS CIO Juan Perez to find out how making his IT department "business intimate" is driving innovation. We look at how cloud management platforms can help ease the adoption of multiple public cloud services. And we examine how UK local councils are struggling to deal with cyber attacks. Read the issue now.

  • Computer Weekly – 19 December 2017: Navigating through digital change

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, IT leaders share the lessons learned and discuss best practice in digital transformation. We find out how SAP is addressing customer concerns about its indirect licensing policies. And we assess whether SME IT suppliers are making headway in selling to government CIOs. Read the issue now.

  • Essential Guide: Optimising hybrid IT infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    In this essential guide, we include articles looking at best practice and key technologies in server, storage, networks, DevOps and hyperconverged systems to make the most of your hybrid IT.

  • The promise (and pitfalls) of self-service automation in customer service

    Sponsored by: Talkdesk

    Customers have new standards for service. They want timely, efficient service that’s available to them 24/7. However, this can be difficult for organizations to manage, as most don’t have the resources to meet these expectations. So, how can automation help? Access this guide to learn more.

  • Hybrid cloud: What enterprises need to know today

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a look at some of the latest thinking and trends around hybrid cloud, and shine a light on some of the enterprises who are favouring this IT infrastructure approach.

  • Computer Weekly – 13 September 2022: Source responsibly: Tech sector efforts to root out forced labour are failing

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we analyse the technology industry's failure to extirpate forced labour and slavery from its supply chains. We find out how cyber security firm Okta is rebuilding customer trust after a major security incident. And we discover how Caterpillar is modernising its data management. Read the issue now.

  • Artificial Intelligence (AI) And The Future Of Application Security Testing

    Sponsored by: Veracode

    With advances in AI capabilities, hackers have leveraged the evolving technology in order to perform more sophisticated attacks at scale. If actual attacks are using AI, then simulated attack testing that is performed at scale using AI is as close of a simulation to the real thing as one could hope for. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.