ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • The Cloud Influence on GRC

    Sponsored by: TechTarget Security

    Cloud computing risk management, governance and compliance processes are evolving as organizations increasing turn to hosted services. Learn how in our SearchCompliance handbook.

  • CW ASEAN, November 2018: Blockchain is no 'magic wand' for security

    Sponsored by: TechTarget ComputerWeekly.com

    Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.

  • A Computer Weekly buyer's guide to Business Intelligence and Analytics

    Sponsored by: TechTarget ComputerWeekly.com

    Business intelligence and analytics is an ever-changing landscape. In this 20-page buyer's guide, Computer Weekly looks at firms' search for data scientists, how modern business intelligence works for big data and the role DevOps can play in navigating a data onslaught.

  • CW ASEAN: Preparing for 5G

    Sponsored by: TechTarget ComputerWeekly.com

    As telcos gear up to roll out the first 5G networks, enterprises are keen to see how they can take advantage of faster 5G networks to support a broad range of applications. In this edition of CW ASEAN, we look at how enterprises in ASEAN are readying themselves for 5G to take advantage of the new technology. Read the issue now.

  • Computer Weekly - 28 September 2021: Chancellor Rishi Sunak talks tech

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the Chancellor of the Exchequer about his plans to support innovation and growth in the UK tech sector. Composable IT is the latest trend in building software to support business change. And Halfords built its own service management software – and now is selling it to other retailers. Read the issue now.

  • Making the Move to S/4HANA and Cloud-Based ERP

    Sponsored by: Microsoft, Intel, SAP

    In this expert e-guide, we explore how to future-proof your ERP system and increase its flexibility. Learn about the migration to S/4HANA as well as the pros and cons of private vs. public vs. hybrid cloud-based ERP deployments.

  • Walk a Mile in Your Buyers Shoes

    Sponsored by: Enterprise Strategy Group

    When seeking outsourced content creation assistance, 41% of marketers rank finding partners that can empathize with their audience as a top challenge. Empathy drives engagement; so, how can you integrate more of it into your organization’s content for B2B buyers? Find tips in this 13-page e-book by TechTarget’s Enterprise Strategy Group (ESG).

  • Computer Weekly - 25 January 2022: Why watching your remote workers doesn't work

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the surge in home working led many firms to mandate use of surveillance software – we look at why it hasn't worked. It's an important year for public sector IT – we examine the trends for 2022. And with robotic process automation (RPA) booming, a Swedish bank explains the benefits. Read the issue now.

  • How to unlock the true value of data

    Sponsored by: TechTarget ComputerWeekly.com

    With a robust data architecture in place, a firm's data science team can turn raw data into business insight. We take a quick look at how this can be done.

  • Poland's Storage market on the rise

    Sponsored by: TechTarget ComputerWeekly.com

    Poland's storage market has been on a steady rise but what's the reason behind this? We investigate...

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.