ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Computer Weekly – 28 February 2017: Navigating software licences

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after SAP won a court case against a major customer, Diageo, over software charges, we look at what this means for users. We talk to the IT consultancy that recruits only autistic IT professionals. And we look at the CIO's big challenges for the year. Read the issue now..

  • Computer Weekly – 12 July 2016

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue we explore the many ways Watson has evolved from the machine that bettered humans in Jeopardy! to providing deep analytical insights to solve real world crises. We also look at how Barclay's bank is using DevOps to remain competitive and reveal new research that illustrates why cloud computing is at the heart of business innovation.

  • Computer Weekly – 4 September 2018: Power Play – how GE builds digital into its products

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we speak to Bill Ruh, the head of GE Digital about how the business has changed to focus on customer outcomes following a change in senior leadership. The company is exploring new industries to take its Predix platform such the hospitality sector. We also look at the problems of implementing SAP S/4 Hana.

  • The State of DataOps

    Sponsored by: HighByte

    For many reasons, the complexity of today’s data ecosystem hinders the democratization of data and analytics. This e-book by ESG provides insights on how to improve the quality, delivery and management of data/analytics at scale using DataOps. Explore this e-book to learn key findings and use the report to compare your performance to your peers.

  • Print security: An imperative in the IoT era

    Sponsored by: TechTarget ComputerWeekly.com

    Analyst group Quocirca gives the perspective on the risks and best practices of print security.

  • Computer Weekly - 5 May 2020: The role of AI in the war against pandemics

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how AI and data science are supporting the global push to deal with the coronavirus pandemic. We reveal, and talk to, the man behind the world's first computer virus pandemic, the Love Bug. And we examine how the IT services market will change as a result of the current crisis. Read the issue now.

  • Identity Governance & Administration Solution Buyer’s Guide

    Sponsored by: Saviynt

    Over the last few years, cloud acceleration, security threats, and constant technology transformation have bombarded enterprises. IGA is fundamental to modern enterprise security. Importantly, IGA builds a foundation for Zero Trust across cloud, hybrid, and on-prem environments. Read on to learn more.

  • A guide to platform agnostic application delivery

    Sponsored by: TechTarget ComputerWeekly.com

    There is no single answer to the question of how to run applications independent of the underlying hardware. In this e-guide, we explore options for application virtualisation.

  • Computer Weekly – 11 October 2022: Government bins IR35 reforms – what you need to know

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after the government scrapped its IR35 reforms, we examine what IT contractors need to know. With hybrid working, employee experience is a priority – we look at how it meshes with customer experience initiatives. And we assess the options for unstructured data storage in the cloud and on-premise. Read the issue now.

  • Zero Standing Privilege

    Sponsored by: CyberFOX

    Cybersecurity threats are on the rise, and businesses must take action to protect their data. This e-book explores the top cyber risks, the costs of breaches, and how to implement a Zero Trust security model with Privileged Access Management (PAM). Access the e-book to learn how to secure your organization and minimize risk.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.