ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Passkeys Primer

    Sponsored by: Okta

    Synced passkeys are a significant step towards a passwordless world, offering increased security and convenience over traditional passwords. Learn how passkeys work and explore different implementation approaches in this comprehensive white paper.

  • Personal branding in the digital age: How to become a known expert, thrive and make a difference in a connected world

    Sponsored by: TechTarget ComputerWeekly.com

    This chapter from Francine Beleyi's book Personal branding in the digital age, explains the seven key pillars you need to build a successful personal brand.

  • Why Deep Observability is Foundational for NDR Success

    Sponsored by: Gigamon

    Comprehensive network visibility is essential for effective network detection and response (NDR). This solution brief explores how the Gigamon Deep Observability Pipeline can empower NDR tools with full-fidelity, decrypted data to improve threat detection and response. Read the full solution brief to learn more.

  • Computer Weekly – 19 July 2016

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.

  • How to Transform Your Business with APIs, Integration & Microservices

    Sponsored by: Software AG

    Explore how APIs, integration, and microservices can unlock innovation, simplify digital transformation, and lower the costs and risks. This e-book examines real-world success stories and provides insights to help your business thrive in a digital world. Read the e-book to learn more.

  • Storage As A Service For Dummies

    Sponsored by: Pure Storage

    Download your free copy of Storage as a Service for dummies for your essential, comprehensive introduction to how your organization can make the most out of storage as a service solutions.

  • Voice Intelligence (Vi)™ Boosting Workplace Productivity

    Sponsored by: T-Mobile for Business

    To close deals and get more done, you might feel compelled to make a drastic change, like hiring an entirely new team. But there is one small change that combines speech recognition and machine learning that helps employees accomplish more in

  • IT Priorities 2020: India

    Sponsored by: TechTarget ComputerWeekly.com

    As an IT powerhouse, India continues to be the pace setter for growth in Asia-Pacific's IT industry. In this guide to IT Priorities in 2020, find out what 243 Indian IT professionals revealed about their digital transformation efforts and key areas of spending for the coming year.

  • Wind River Linux For Medical Devices

    Sponsored by: Wind River

    Open source Linux is cost-effective and customizable for medical device development but presents security and compliance issues. Wind River Linux offers an advanced embedded platform with robust security, compliance support, and lifecycle management, aiding innovation and risk reduction in medical devices. Learn more in the full overview.

  • Private/Hybrid Cloud – Data Center Solutions

    Sponsored by: Morpheus Data

    The report analyzes the evolving private/hybrid cloud management and resiliency platform markets, highlighting key trends like AI/ML integration and cloud cost optimization. It provides insights into leading vendors and their capabilities to help enterprises make informed decisions. Read the full report to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.