Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"
-
TechTarget's Guide to Managing Multiple AWS Accounts and Resources
Sponsored by: TechTarget Cloud ComputingManaging multiple AWS accounts can be challenging, but this guide simplifies the process. Learn best practices for using AWS Organizations, resource hierarchy, and AWS Control Tower to streamline account management, governance, and automation for more efficient cloud operations.
-
How the application integration landscape is changing
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we discover how the industry is trying to make it possible to link applications together in order to share resources with ease. We take a look at how technologies like Distributed Computing and the Common Object Model have been refined into web services, service-oriented architecture and composable applications and microservices.
-
Artificial intelligence in ITSM: Finding the right tools for you
Sponsored by: TechTarget ComputerWeekly.comAI functionality is poised to be a game-changer in the ITSM world. But before exploring the possibilities for AI in ITSM, it's important to first understand what AI is - and what it is not.
-
A guide to continuous software delivery
Sponsored by: TechTarget ComputerWeekly.comSoftware empowers business strategy. In this e-guide we explore how to deliver new software-powered functionality for continuous business improvement.
-
The long march of S/4 Hana
Sponsored by: TechTarget ComputerWeekly.comS/4 Hana, the ERP system built on SAP's in-memory, columnar database Hana has been on a long march through the enterprise since its launch in February 2013. In this e-guide, we discuss the pros and cons of upgrading to S/4 Hana, what the future has in store for the system and how its users are feeling about C/4 Hana integration.
-
It's complicated: how data integration lies at the heart of evermorecomplex data architectures
Sponsored by: TechTarget ComputerWeekly.comData integration and preparation remains the knotty problem at the heart of many data management and business intelligence programmes.Demands on IT leaders in user organisations – especially large, complex ones – are and will continue to be equally complex and pressing as boards look to get business value from data. Read more in this e-guide.
-
A Computer Weekly buyer's guide to on-site, off-site and cloud-based disaster recovery
Sponsored by: TechTarget ComputerWeekly.comWith businesses becoming increasingly dependent on data to function, being able to recover quickly from an IT systems failure is critical. In this 14-page buyer's guide, Computer Weekly looks at the various options available when implementing disaster recovery.
-
How to achieve network infrastructure modernization
Sponsored by: TechTarget ComputerWeekly.comUpgrading to advanced network infrastructure involves firms being able to deliver mission-critical services through cloud providers and through their own cloud resources. Increased network infrastructure capacity need has seen deployment of optical networking and advanced network solutions such as software-defined wide area network (SDWAN).
-
Shields up! Why Russia's war on Ukraine should matter to security pros
Sponsored by: TechTarget ComputerWeekly.comThe build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.
-
Jargon buster guide to hybrid cloud storage
Sponsored by: TechTarget ComputerWeekly.comIn this Jargon Buster guide we bring you definitions for the key concepts in hybrid cloud storage plus in-depth articles on hybrid cloud file and object storage, how to use the cloud as a storage tier and the key decision points when it comes to private cloud vs hybrid cloud.