ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • CW APAC - November 2019: Expert advice on container security

    Sponsored by: TechTarget ComputerWeekly.com

    For all the promises of containers, changes in architectureand practices associated with the technology bring newchallenges and opportunities. In this handbook, Computer Weekly looks at the security challenges associated with container technology. Read the issue now.

  • CW ANZ: Trend Watch - communications infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how Australia's bushfires impacted its telecoms networks and the increase in SD-WAN adoption in Asia-Pacific

  • CW EMEA July 2023: Can we trust AI?

    Sponsored by: TechTarget ComputerWeekly.com

    Artificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public.

  • CW ANZ, July 2020: Expert Advice on Security

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.

  • Customer Experience Insights Guide

    Sponsored by: ARG, Inc.

    According to a recent study, every year $98 billion is lost by companies failing to provide “simple” experiences that customers want. This report provides a complete breakdown of the current state of customer experience, looking at the key trends defining the modern customer’s demands. Read on to learn more.

  • CW Nordics - August-October 2022: Norway struggles to keep up with demand for tech specialists

    Sponsored by: TechTarget ComputerWeekly.com

    The growing importance of IT in all industries, along with a shortage in skills, make for an excellent high-tech job market for candidates in Norway. Read how recruiters are struggling to keep up with demand. Also read how the Danish government encourages research in strategic fields to attract tech companies.

  • Dutch IoT value still not understood

    Sponsored by: TechTarget ComputerWeekly.com

    The Netherlands is a country where tech is being applied to all manner of business challenges and a magnet for tech innovators. So why, according to research, are almost 90% of businesses in the Netherlands barely aware of the competitive advantages the internet of things (IoT) can offer them? Read more about it in this issue.

  • Legacy PKI Migration

    Sponsored by: Venafi

    52% of the 2500 participants surveyed by the Ponemon Institute reported that their organizations have poor visibility of apps that rely on Public Key Infrastructure (PKI). Along with exploring that obstacle, this white paper considers other challenges that legacy PKI can pose. To unlock those insights and more, read on.

  • Designing Customer Conversations: Best Practices

    Sponsored by: Talkdesk

    To design customer conversations, it’s crucial to consider the user experiences and not just the artificial intelligence that’s behind the processes. However, to do this, companies need to know the dos and don’ts for successful virtual agents, as well as the basics for creating proper customer conversations. Access the guide to learn more.

  • The Definitive Guide to Cost-Effective AI

    Sponsored by: Domino

    To succeed in this AI-centric business world, it is important to not only leverage the power of AI but to do so responsibly and cost-effectively. In this e-book, you will discover the importance of a data science and AI platform’s role in optimizing ROI. Read on to learn how you can build trust and reputation with customers and stakeholders.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.