ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • The Cloud Cost Optimization Imperative for Data-Intensive Workloads on Amazon EMR and Amazon EKS

    Sponsored by: Pepperdata

    Explore how Pepperdata Capacity Optimizer can reduce cloud waste and cost for data-intensive workloads like Apache Spark by up to 47% - automatically and autonomously, with no application changes required. Read the white paper to learn more.

  • Who will win the world's biggest cloud contract?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.

  • CW Nordics - February-April 2022: Swedish drone app gets life-saving equipment to heart attack victims

    Sponsored by: TechTarget ComputerWeekly.com

    Thanks to an app developed in Sweden, drones can get life-saving equipment to heart-attack victims before emergency services can arrive on the scene, potentially increasing patient survival rates. Also in this issue, read about a Swedish bank's time-saving robots.

  • Computer Weekly – 20 November 2018: How the Science Museum is moving to the digital age

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how London's Science Museum is dealing with legacy IT to move into the age of digital and data. We examine Nationwide Building Society's move to cloud and DevOps. And we look at how technologies such as machine learning and blockchain are helping to automate global supply chains. Read the issue now.

  • Capture the Moment

    Sponsored by: Wheel Health

    Wheel is the leading telehealth platform built forlife science companies to connect every consumerwith the care programs and clinicians they need at scale. Discover how to "Capture the Moment with Wheel" in this informative white paper. Learn about the product's features and benefits to enhance your experience.

  • The State of Zero Trust Security 2023

    Sponsored by: Okta

    In partnership with Qualtrics, Okta conducted a global study with the help of 860 information security decisionmakers across a range of industry verticals. In the 38 pages of this report, Okta has condensed the findings of this research so that you can extract the most valuable and relevant information. Read on to learn more.

  • Critical Gaps in Securing Identities

    Sponsored by: CyberArk

    There are significant challenges in securing applications that sit outside of the protections offered by SSO and MFA. Learn in this report, which surveyed senior cybersecurity professionals, how they are approaching these access security challenges and their best practices.

  • CW Europe – March-May 2019: Robots deliver savings for Dutch postal service PostNL

    Sponsored by: TechTarget ComputerWeekly.com

    European businesses have bought into the digital revolution, with the adoption of the latest technologies like automation enabling companies to transfer their internal operations.

  • 15 Machine Learning Use Cases to Solve Everyday Business Problems

    Sponsored by: Alteryx

    When most people think about machine learning, they assume it’s a complex form of AI beyond their reach, requiring hours of coding and complex algorithms to create functional models. But with modern analytics solutions like Alteryx, anyone can create and automate ML models in minutes. Read on to discover 15 use cases for immediate business impact.

  • Trends In Zero Trust Strategies And Practices Remain Fragmented, But Many Are Seeing Success

    Sponsored by: Portnox

    34% of organizations report having paused or abandoned a zero-trust project in the past, according to research by TechTarget’s Enterprise Strategy Group (ESG). To discover the drivers that informed that decision, and to explore other trends in zero trust, dig into this ESG research report.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.