Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"
-
Top 10 datacentre stories of 2019
Sponsored by: TechTarget ComputerWeekly.comThe demand from the hyperscale cloud and internet companies for colocation capacity continued to cast a long shadow over the datacentre sector in 2019, and served to ensure a number of the trends that have influenced the news cycle in previous years continued to play out. Here's a look back over Computer Weekly's top 10 datacentre stories of 2019.
-
We Solved the Infrastructure Access Problem
Sponsored by: StrongDMIn this e-book, you’ll learn how several organizations, from growing startups to established enterprises, solved the access problem using StrongDM. Read now to access their case studies and see how you could follow in the footsteps of their success.
-
The Future of Data Security Posture Management
Sponsored by: OpenTextThis white paper examines the evolution of data security posture management (DSPM) and how it can help organizations better protect their data. It explores the impact of AI on DSPM and how the platform can enable business growth by providing a robust data security foundation. Read the full white paper to learn more.
-
Human-Centric AI At Work: A Marketer’s Playbook For Powering Your Organization With AI
Sponsored by: AsanaAre you prepared to lead your company through the AI era? In this playbook, you’ll learn how to help your organization work smarter with AI and drive real results. If you don’t want to get left behind in the wake of this transformative technology, this playbook is for you. Download your copy now.
-
Build Responsible Generative AI Applications: Introducing the RAFT Framework
Sponsored by: DataikuYes, Generative AI (GenAI) presents myriad opportunities. But GenAI can also pose myriad risks, especially if an AI system is not responsibly designed, deployed and governed. In this 16-page e-book, discover what constitutes responsible GenAI and learn how to implement a responsible approach at your own organization.
-
A Computer Weekly Buyer's Guide to Containers and Microservices
Sponsored by: TechTarget ComputerWeekly.comIn this 13-page buyer's guide, Computer Weekly looks at how the architectures are configured, the suppliers building them – and the benefits to the organisation using them.
-
Cloud Migration: How to do so safely and securely
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we take a closer look at what enterprises need to consider before pressing play on their cloud migration plans. Not only to ensure their move to the off-premise world goes as smoothly as possible, but also to make sure it brings the maximum amount of benefit to their business.
-
Premier Fortune 500® Technology Company Saves 30% on IT
Sponsored by: ARG, Inc.Mergers and acquisitions create turmoil in organization’s IT. To help a Fortune 500 company smooth their transition after acquiring a new organization, they turned to ARG. Access the case study here to learn how they more than doubled their initial goal to reduce network spending by 15%.
-
Data discovery: how to pick the right software
Sponsored by: TechTarget ComputerWeekly.comIn this guide, we break down data discovery software by defining the categories, explaining the features and revealing the benefits. We also highlight the major players and products in an effort to inform buying decisions.
-
Secure Connectivity for Devices and Users at the Network Edge
Sponsored by: CradlepointYes, security threats are expanding – and so is the network edge. So, how can you ensure your organization’s users at the edge are as secure as possible? Tap into this e-book by Cradlepoint for guidance.