ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Kubernetes Backup, Dr, & App Mobility With Kasten K10

    Sponsored by: Zadara Storage

    Protect Kubernetes data with an integrated, validated solution from Zadara and Kasten by Veeam. Secure your cloud-native applications with comprehensive backup, DR, and app mobility. Learn how this unified data management solution can simplify operations and reduce risk. Read the full overview.

  • Balancing Human And Digital: Are Banks Losing Touch With Customers?

    Sponsored by: Avanade

    Today, banks are challenged to balance human engagement and digital interactions – a high-wire act, Avanade explains in this research report. To find out why the pursuit is a challenging one, and to access guidance for approaching it, dive into the 18-page report.

  • CIO Trends #4: Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at some of the exciting technology developments being tested or already in use in the Middle East.

  • Enterprise 2030: Building The AI Powered Company Of The Future

    Sponsored by: Teradata

    Access this research report to learn why the most future-ready organizations will be the ones that make AI a competitive advantage, as well as 4 steps business leaders can take today to accelerate their transformations, starting with evaluating their data and AI maturity.

  • CW ASEAN – January 2019: Dive into microservices

    Sponsored by: TechTarget ComputerWeekly.com

    In this edition of CW ASEAN, we uncover the state of adoption of microservices in ASEAN and what needs to be in place for enterprises to get the most out of the technology.

  • How To Build, Scale & Evolve The Modern Data-Driven Demand Gen Engine

    Sponsored by: TechTarget

    In this e-book, explore the key considerations for how to begin, grow and continuously optimize a complete demand gen engine while staying responsive to changing business conditions as you go.

  • Top 10 cyber crime stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.

  • Biometrics in the enterprise: An opportunity or an ethical minefield?

    Sponsored by: TechTarget ComputerWeekly.com

    Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.

  • Top 10 enterprise IT in the Middle East stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Countries in the Middle East have become pioneers of the latest digital technologies and some of the articles featured by Computer Weekly this year evidence that. Here are Computer Weekly's top 10 enterprise IT in the Middle East stories of 2019.

  • Computer Weekly: Data Danger

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.