ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Top 10 datacentre stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    The demand from the hyperscale cloud and internet companies for colocation capacity continued to cast a long shadow over the datacentre sector in 2019, and served to ensure a number of the trends that have influenced the news cycle in previous years continued to play out. Here's a look back over Computer Weekly's top 10 datacentre stories of 2019.

  • We Solved the Infrastructure Access Problem

    Sponsored by: StrongDM

    In this e-book, you’ll learn how several organizations, from growing startups to established enterprises, solved the access problem using StrongDM. Read now to access their case studies and see how you could follow in the footsteps of their success.

  • The Future of Data Security Posture Management

    Sponsored by: OpenText

    This white paper examines the evolution of data security posture management (DSPM) and how it can help organizations better protect their data. It explores the impact of AI on DSPM and how the platform can enable business growth by providing a robust data security foundation. Read the full white paper to learn more.

  • Human-Centric AI At Work: A Marketer’s Playbook For Powering Your Organization With AI

    Sponsored by: Asana

    Are you prepared to lead your company through the AI era? In this playbook, you’ll learn how to help your organization work smarter with AI and drive real results. If you don’t want to get left behind in the wake of this transformative technology, this playbook is for you. Download your copy now.

  • Build Responsible Generative AI Applications: Introducing the RAFT Framework

    Sponsored by: Dataiku

    Yes, Generative AI (GenAI) presents myriad opportunities. But GenAI can also pose myriad risks, especially if an AI system is not responsibly designed, deployed and governed. In this 16-page e-book, discover what constitutes responsible GenAI and learn how to implement a responsible approach at your own organization.

  • A Computer Weekly Buyer's Guide to Containers and Microservices

    Sponsored by: TechTarget ComputerWeekly.com

    In this 13-page buyer's guide, Computer Weekly looks at how the architectures are configured, the suppliers building them – and the benefits to the organisation using them.

  • Cloud Migration: How to do so safely and securely

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a closer look at what enterprises need to consider before pressing play on their cloud migration plans. Not only to ensure their move to the off-premise world goes as smoothly as possible, but also to make sure it brings the maximum amount of benefit to their business.

  • Premier Fortune 500® Technology Company Saves 30% on IT

    Sponsored by: ARG, Inc.

    Mergers and acquisitions create turmoil in organization’s IT. To help a Fortune 500 company smooth their transition after acquiring a new organization, they turned to ARG. Access the case study here to learn how they more than doubled their initial goal to reduce network spending by 15%.

  • Data discovery: how to pick the right software

    Sponsored by: TechTarget ComputerWeekly.com

    In this guide, we break down data discovery software by defining the categories, explaining the features and revealing the benefits. We also highlight the major players and products in an effort to inform buying decisions.

  • Secure Connectivity for Devices and Users at the Network Edge

    Sponsored by: Cradlepoint

    Yes, security threats are expanding – and so is the network edge. So, how can you ensure your organization’s users at the edge are as secure as possible? Tap into this e-book by Cradlepoint for guidance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.