ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • CW ANZ: Taming the data beast

    Sponsored by: TechTarget ComputerWeekly.com

    Software-defined storage (SDS), which promises greater transparency and control over data, is an increasingly important tool in the enterprise technology armoury. In this issue of CW ANZ, we look at how Australian enterprises are turning to SDS to improve data management and direct data to different tiers of storage or to applications.

  • TDWI Playbook: Strategies and Practices for Responsible AI. Sponsored by Domino, AWS, NVIDIA

    Sponsored by: Domino

    As the AI landscape rapidly evolves, how can you ensure that your organization’s approach to AI is responsible? In this 18-page e-book “Strategies and Practices for Responsible AI,” unlock insights from Vice President and Senior Director of TDWI Research for advanced analytics, Fern Halper, Ph.D.

  • Top 10 Australian IT stories of 2020

    Sponsored by: TechTarget ComputerWeekly.com

    Against all odds, the Australian people and businesses proved their mettle, becoming one of the first countries in the world to emerge from the pandemic. Companies pivoted quickly and adopted new business models while supercharging digitisation initiatives at an unprecedented pace. Here are Computer Weekly's top 10 Australia IT stories of 2020:

  • Don’t drown in data debt; champion your Data First culture

    Sponsored by: Syniti

    Modern enterprises are struggling with data debt, as over 40% of data is unusable. This creates lost opportunity cost. To harness data's full power, enterprises must champion a "Data First" culture, address data quality, and partner with specialized data providers. Download this report to learn how you can reduce your data debt.

  • Kubernetes Patterns Reusable Elements For Designing Cloud Native Applications

    Sponsored by: Red Hat

    This exhaustive O'Reilly e-book aims to help developers discover and learn about the most common patterns for creating cloud-native applications with Kubernetes. Read the book now, or save it for reference material in a pinch.

  • Secure remote access: More vital than ever thanks to Covid-19

    Sponsored by: TechTarget ComputerWeekly.com

    We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.

  • Computer Weekly – 20 September 2022: A gold medal performance for networking

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the IT team behind the 2022 Commonwealth Games in Birmingham delivered a winning performance, how the centuries-old London insurance market is going digital, thanks to Lloyd's of London, and how low-cost high street stores succumbed to the inevitable and are going online. Read the issue now.

  • A Comprehensive Approach to Trustworthy AI Governance

    Sponsored by: SAS

    Download this e-book to discover Trustworthy AI – a system designed to ensure safety, reliability and ethical practices – can help overcome the risks of unsupervised AI.

  • Computer Weekly – 7 February 2017: Computer power pushes the boundaries

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the ways chip engineers are looking beyond silicon to keep pushing the limits of Moore's Law. We find out about serverless computing and how it could deliver what many firms want from the cloud. And we look at the importance of culture change to digital transformation. Read the issue now.

  • AI-Driven SOC Transformation with Cortex XSIAM

    Sponsored by: Palo Alto Networks

    Discover how AI-driven solutions like Cortex XSIAM can transform your security operations center (SOC). Learn how leading organizations improved efficiency, reduced false positives, and accelerated incident resolution. Read the white paper to see the results XSIAM can deliver for your SOC.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.