ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • How Covid-19 is affecting the colocation market

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide shares details of some of the latest trends and thinking in colocation, while also shining a light on how datacentre operators are rushing to meet the soaring demand for compute capacity they are seeing both from enterprises and hyperscale cloud firms.

  • A Computer Weekly buyer's guide to next-generation programming tools

    Sponsored by: TechTarget ComputerWeekly.com

    All kinds of organisations are waking up to the benefits of next-generation programming tools. In this 14-page buyer's guide, Computer Weekly looks at how low-code tools are helping a range of users, the ways they can boost efficiency and the many considerations that come with them.

  • Australia's cybersecurity game plan

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.

  • Entering a New Era of AI-Powered Productivity with Microsoft 365 Copilot

    Sponsored by: Zones, Inc.

    Microsoft 365 Copilot leverages AI to boost productivity; read how it streamlines workflows, reduces information overload and elevates team collaboration in Word, Excel, Outlook, PowerPoint and Teams. Participate in a 3-day Copilot workshop to unlock its potential. Learn more in the full infographic.

  • CW Middle East - January-March 2022: What does Saudi Arabia's autonomous vehicle agenda mean for the world?

    Sponsored by: TechTarget ComputerWeekly.com

    If all goes according to plan, within a few years, one million people will live in Saudi Arabia's 'city of the future' – and every one of them will depend on a fleet of self-driving cars. Also in this issue, read about the UAE's bid to become a world-leading location for artificial intelligence innovation.

  • Tailoring Your Content Plan to Meet Your Buyers’ Needs

    Sponsored by: BrightTALK by TechTarget

    To stay relevant in your markets, it’s critical to be in touch with your customers’ ever-changing needs. However, understanding what consumers want continues to be a challenge for many marketing and sales teams. Access this guide to learn more.

  • Powering down: Keeping datacentre energy costs in check

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a look at some of the outside influences that could potentially impact on datacentre power and management costs in the years to come, while also taking a closer look at some of the latest thinking and best practices around datacentre energy efficiency and cooling today.

  • The 2024 Block Data Storage Buyer's Guide

    Sponsored by: StorPool

    How can you ensure you select the most appropriate block storage software or system for your business’ unique needs? Look no further than this Block Storage Buyer's Guide. Download a copy to solve 8 common block storage challenges, to evaluate block storage options, and more.

  • Stop breaches with privileged access security white paper

    Sponsored by: One Identity

    Today's privileged access security is critical to protect digital resources and users. Learn how to implement a modern identity security strategy, including Zero Trust principles, to reduce cyber risks. Read the white paper for more insights.

  • Atlassian Cloud Data Protection

    Sponsored by: Atlassian

    In most industries, the most important asset to an organization is data. The problem is that data is becoming more challenging to protect and secure, and this is no different in the cloud. If your data isn’t protected correctly, the cost of a breach can take down an entire organization. So, what are the challenges? Read on to find out more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.