Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"
-
CW ANZ: Taming the data beast
Sponsored by: TechTarget ComputerWeekly.comSoftware-defined storage (SDS), which promises greater transparency and control over data, is an increasingly important tool in the enterprise technology armoury. In this issue of CW ANZ, we look at how Australian enterprises are turning to SDS to improve data management and direct data to different tiers of storage or to applications.
-
TDWI Playbook: Strategies and Practices for Responsible AI. Sponsored by Domino, AWS, NVIDIA
Sponsored by: DominoAs the AI landscape rapidly evolves, how can you ensure that your organization’s approach to AI is responsible? In this 18-page e-book “Strategies and Practices for Responsible AI,” unlock insights from Vice President and Senior Director of TDWI Research for advanced analytics, Fern Halper, Ph.D.
-
Top 10 Australian IT stories of 2020
Sponsored by: TechTarget ComputerWeekly.comAgainst all odds, the Australian people and businesses proved their mettle, becoming one of the first countries in the world to emerge from the pandemic. Companies pivoted quickly and adopted new business models while supercharging digitisation initiatives at an unprecedented pace. Here are Computer Weekly's top 10 Australia IT stories of 2020:
-
Don’t drown in data debt; champion your Data First culture
Sponsored by: SynitiModern enterprises are struggling with data debt, as over 40% of data is unusable. This creates lost opportunity cost. To harness data's full power, enterprises must champion a "Data First" culture, address data quality, and partner with specialized data providers. Download this report to learn how you can reduce your data debt.
-
Kubernetes Patterns Reusable Elements For Designing Cloud Native Applications
Sponsored by: Red HatThis exhaustive O'Reilly e-book aims to help developers discover and learn about the most common patterns for creating cloud-native applications with Kubernetes. Read the book now, or save it for reference material in a pinch.
-
Secure remote access: More vital than ever thanks to Covid-19
Sponsored by: TechTarget ComputerWeekly.comWe explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
-
Computer Weekly – 20 September 2022: A gold medal performance for networking
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how the IT team behind the 2022 Commonwealth Games in Birmingham delivered a winning performance, how the centuries-old London insurance market is going digital, thanks to Lloyd's of London, and how low-cost high street stores succumbed to the inevitable and are going online. Read the issue now.
-
A Comprehensive Approach to Trustworthy AI Governance
Sponsored by: SASDownload this e-book to discover Trustworthy AI – a system designed to ensure safety, reliability and ethical practices – can help overcome the risks of unsupervised AI.
-
Computer Weekly – 7 February 2017: Computer power pushes the boundaries
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the ways chip engineers are looking beyond silicon to keep pushing the limits of Moore's Law. We find out about serverless computing and how it could deliver what many firms want from the cloud. And we look at the importance of culture change to digital transformation. Read the issue now.
-
AI-Driven SOC Transformation with Cortex XSIAM
Sponsored by: Palo Alto NetworksDiscover how AI-driven solutions like Cortex XSIAM can transform your security operations center (SOC). Learn how leading organizations improved efficiency, reduced false positives, and accelerated incident resolution. Read the white paper to see the results XSIAM can deliver for your SOC.