ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • The Top 10 AI Skills Your Team Needs To Put Your Cloud To Work

    Sponsored by: QA

    In this white paper, you'll discover the top 10 AI skills your tech team needs to leverage cloud computing. From data analysis to machine learning and ethical AI, this white paper explores the critical capabilities required to successfully implement AI models and drive business value. Read the full white paper to build your team's AI expertise.

  • CW ASEAN: Connect your people

    Sponsored by: TechTarget ComputerWeekly.com

    Unified collaboration (UC) is transforming the way business is done globally. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises are embracing UC tools, factors that organizations should consider when developing a UC strategy, and the emergence of startups that have been shaking up the marketplace.

  • Computer Weekly – 12 January 2021: Can AI ever match the power of the brain?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, artificial intelligence is still no match for the brain – we talk to Intel's neuromorphic computing lab to see how researchers are trying to address that. Our buyer's guide examines identity and access management. And we find out why datacentres are becoming a new target for financial investors. Read the issue now.

  • The Skeptic’s Guide to Oracle Third-Party Support

    Sponsored by: Spinnaker Support

    This guide answers 15 common queries about third-party Oracle support, addressing legality, quality, response times, costs, and security. It offers facts and recommendations to assess if it suits your organization. Read the full eBook for more details.

  • The Future of Manufacturing with Generative AI

    Sponsored by: Amazon Web Services

    Discover how Amazon Web Services (AWS) can help your industrial organization harness the transformative power of generative artificial intelligence (AI)

  • Digital identity strategies to enhance data privacy and protect networks

    Sponsored by: TechTarget ComputerWeekly.com

    The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.

  • Computer Weekly – 27 February 2024: Microsoft's 'unfair' cloud licensing under scrutiny

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine claims that Microsoft's licensing policies are damaging competition in the cloud. Our latest buyer's guide asks if hybrid cloud is now CIOs' end goal, and not just an interim step on the journey. And we look at how the focus on customer experience is impacting the unified comms market. Read the issue now.

  • How do you solve a problem like security training?

    Sponsored by: TechTarget ComputerWeekly.com

    In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.

  • A Better Way to Bring Buying Teams Together

    Sponsored by: Enterprise Strategy Group

    In ESG white paper, explore how marketing and sales teams can work together to leverage research and analyst insights to build high-value, compelling content that engages buying teams within target accounts.

  • MicroScope: Hatch a plan for retirement

    Sponsored by: MicroScope

    An issue looking at the issues around business management and retirement and how distribution plays a crucial role with cloud and IoT.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.