ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Preparing For 2027: Driving Health Equity With Inclusive Member Education

    Sponsored by: Wolters Kluwer

    As healthcare shifts to address equity, payers must collect data, engage members, and collaborate with providers to meet new CMS Health Equity Index requirements by 2027. Learn strategies to prepare and drive better outcomes in this white paper.

  • Top 10 Middle East stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    With money to invest and well-educated populations, the region is using advanced technology to enhance business as well as the quality of life. Read this top 10 for more examples of digital transformation in the Middle East.

  • The Future of Financial Services: Part 2

    Sponsored by: TechTarget ComputerWeekly.com

    In the second part of our 'Future of Financial Services' e-guide series, read about how the financial services industry is not just being shaken up with cosmetic changes, but is about to go through the process of being stripped down and rebuilt.

  • How to choose and use your new AI assistant

    Sponsored by: GEM

    This e-book offers practical guidance on evaluating AI sourcing products and best practices to drive optimal results. Learn how AI can help you find better talent faster, maximize productivity, and boost conversions. Read the full e-book to discover proven strategies.

  • Customer service: Time to break the rules

    Sponsored by: Avanade

    Discover how generative AI and Microsoft Copilot can transform customer service in banking and insurance. Learn how AI-powered tools can boost efficiency, personalization, and security. Read this white paper to explore how you can leverage generative AI in your organization.

  • Mobilizing a Zero Trust Security Model

    Sponsored by: Okta

    As organizations move towards a distributed workforce, a Zero Trust security model is critical. Learn how SMBs are advancing their identity and access management maturity to secure remote access and build user trust. Read the full white paper to discover the key steps in your Zero Trust journey.

  • Accelerate Growth and Improve Innovation

    Sponsored by: Amazon Web Services

    Discover how public sector organizations are using AI to drive innovation, improve applications, and optimize costs. Learn how AI can accelerate growth and enhance user experiences across industries. Read the full eBook to explore real-world success stories.

  • From patchwork to platform

    Sponsored by: Red Hat

    As the complexity of modern infrastructure escalates, IT organizations need an automation strategy. Given the intricate relationships that exist among these complex environments, a unified automation platform is required. Read on to learn about key considerations you should make to ensure you find the platform best fit for your organization.

  • A Computer Weekly buyer's guide to SIEM and SOAR

    Sponsored by: TechTarget ComputerWeekly.com

    The question of how to use data has big implications on a company's performance. In this 16-page buyer's guide, Computer Weekly looks at how SIEM and SOAR tools assist IT teams, why security tools require strong internal security processes to work effectively and what role they have in a rapidly changing cyber threat landscape.

  • Converting CentOS Linux to Red Hat Enterprise Linux

    Sponsored by: Red Hat

    Learn how to convert your CentOS Linux systems to Red Hat Enterprise Linux (RHEL) with the Convert2RHEL tool. This overview covers conversion methods, the benefits of RHEL, and how Red Hat Consulting can help with complex migrations. Read the full product overview to get started.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.