ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Trends In Zero Trust Strategies And Practices Remain Fragmented, But Many Are Seeing Success

    Sponsored by: Portnox

    34% of organizations report having paused or abandoned a zero-trust project in the past, according to research by TechTarget’s Enterprise Strategy Group (ESG). To discover the drivers that informed that decision, and to explore other trends in zero trust, dig into this ESG research report.

  • Computer Weekly – 7 June 2022: Using technology to reinvent shopping

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after the pandemic led to a boom in e-commerce, we look at how retailers are turning to tech to revitalise their stores. We examine the issues around using algorithmic automation to manage employees. And we find out how data science is supporting drug discovery at Novartis. Read the issue now.

  • 10 Properties Of Secure Medical Systems

    Sponsored by: Wind River

    This white paper outlines 10 key security principles for designing secure medical systems, including data encryption, secure boot, hardware partitioning, and input validation. Implementing these principles can help protect against cyberattacks and safeguard patient health. Read the full white paper to learn more.

  • The Role of Mobile Engagement: Insights from Healthcare Leaders

    Sponsored by: Gozio Health

    Download this report to find out what nearly 275 healthcare executives think about the state of mobile experience in healthcare.

  • CW APAC: CIO trends

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at the top IT predictions for the year ahead

  • A Network Perspective on SASE and SD-WAN

    Sponsored by: Titan One Inc.

    Today, direct cloud connectivity, integrated security, and enhanced experiences are driving SD-WAN adoption. As a result, the line between security and networking is becoming thinner. This this Enterprise Strategy Group (ESG) e-book explores how SASE strategies are fueling the convergence of network and security teams. Download to learn more.

  • UK and Ireland Salary Survey 2016/2017 results

    Sponsored by: TechTarget ComputerWeekly.com

    Over 700 UKI IT professionals reveal their salaries and career expectations for 2016/2017

  • Computer Weekly - 1 March 2022: Post Office Horizon scandal enters public conscience - at last

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, 13 years after Computer Weekly first reported on flaws in the Post Office IT system, a public inquiry finally allows victims to reveal the devastating impact on their lives. Enterprises are starting to evaluate the uses of 5G. And we look at how SMEs have turned to e-commerce after the pandemic. Read the issue now.

  • Think Big, Start Small, Scale Fast: The Data Engineering Workbook

    Sponsored by: HighByte

    In this interactive workbook, you’ll discover 10 steps accompanied by some brief questions that are designed to help industrial leaders learn how they can leverage data engineering strategies to get the most out of their data. Read on to learn how you can unlock hidden business value.

  • Computer Weekly – 5 June 2018: The bumpy ride to digital transformation

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the lessons to be learned from General Electric's bumpy ride to digital transformation. We assess the use of software-defined networking in corporate IT infrastructures. And we find out how Royal Bank of Scotland approaches digital and business innovation. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.