ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Zero Trust Access For Dummies, 3rd Fortinet Special Edition

    Sponsored by: Fortinet, Inc.

    In this eBook, you’ll learn all about Zero Trust Network Access (ZTNA) technology and the strategy for securing users’ remote access. After reading “Zero Trust Access For Dummies,” you will know how to control what devices connect to your network and applications – and much more.

  • Data Management In Financial Services: Why On-Demand Access To Accurate, Live Data Tops The Agenda

    Sponsored by: InterSystems

    Financial services need a single view of accurate, live, and trusted data accessible on demand to gain a competitive edge. Smart data fabrics are empowering financial institutions with simpler data architectures and greater data democratization, but what exactly are they? Access this Celent report to learn how you can benefit from these solutions.

  • Every Second Counts ... And Costs Why Everyone Should Use A Single HR Software

    Sponsored by: Paycom

    Despite today’s digital reality, surprisingly few organizations have adapted in their employees’ eyes. In this white paper, you’ll learn how embracing a comprehensive HCM technology can help you protect your business and establish a culture of employee engagement, compliance, and accountability. Read on to learn more.

  • CIO Trends Q1 2016

    Sponsored by: TechTarget ComputerWeekly.com

    This guide offers a collection of our most popular articles for IT leaders during the first few months of 2016, examining the changing role of CIOs and how to enhance their relationships with their peers across the business.

  • DIY AI Assessment: Recognizing And Evaluating AI Use Cases With T-Systems

    Sponsored by: T-Systems

    Despite the vast expanse of applications that could benefit from AI integration, the shortage of dedicated AI specialists often poses a bottleneck. This white paper aims to close the gap by enabling software development and operations professionals to effectively recognize AI use cases and perform initial assessments. Read on to learn more.

  • Time to rekindle the Digital Transformation drive

    Sponsored by: TechTarget ComputerWeekly.com

    The pandemic has shone a spotlight on the importance of joined up processes where manual intervention is kept to a minimum. In this e-guide we explore how IT spending is shifting to support post coronavirus digital transformation initiatives that connect internal business units and external partners to reduce manual intervention.

  • Time to rekindle the Digital Transformation drive

    Sponsored by: TechTarget ComputerWeekly.com

    The pandemic has shone a spotlight on the importance of joined up processes where manual intervention is kept to a minimum. In this e-guide we explore how IT spending is shifting to support post coronavirus digital transformation initiatives that connect internal business units and external partners to reduce manual intervention.

  • Computer Weekly – 23 April 2024: How data keeps Britain's trains on track

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how Network Rail is ensuring train safety in the face of extreme weather thanks to advanced data analytics. Our latest buyer's guide examines the latest trends in storage technology. And we talk to the Ministry of Defence's first ever chief data officer. Read the issue now.

  • Computer Weekly – 8 August 2023: How to improve developer productivity

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide examines the developer experience and looks at how critical it can be for productivity. The tech sector still struggles with diversity and inclusion – we ask what's standing in the way of ethnic minorities making it to the top. Read the issue now.

  • Step-by-step disaster recovery planning guide

    Sponsored by: TechTarget ComputerWeekly.com

    IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.