ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Cloud migration: What enterprises need to know

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a closer look at what enterprises need to consider to make moving to the cloud as seamless as possible, while sharing some success stories of big name enterprises that have already successfully done it.

  • Device Subscription Services

    Sponsored by: Unisys

    In this complete buyer's guide to device subscription services (DSS), you'll learn how DSS can transform your device management strategy by providing predictable costs, enhanced productivity, and improved employee experience. Download the full guide now to find out how you can revolutionize your approach to device management.

  • Computer Weekly – 27 February 2024: Microsoft's 'unfair' cloud licensing under scrutiny

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine claims that Microsoft's licensing policies are damaging competition in the cloud. Our latest buyer's guide asks if hybrid cloud is now CIOs' end goal, and not just an interim step on the journey. And we look at how the focus on customer experience is impacting the unified comms market. Read the issue now.

  • Harnessing the Power of Smart Stores

    Sponsored by: Amazon Web Services

    The power of Smart Stores. Physical stores still represent 80 percent of retail sales, making exceptional in-store service a modern imperative. With AWS Smart Store capabilities, you can: Update digital technologies in physical stores, empower advanced in-store operations, and provide a seamless checkout experience for customers.

  • Answering your 4 biggest questions about generative AI security

    Sponsored by: AWS

    In the eBook Answering Your 4 Biggest Questions about Generative AI Security, you will discover how to begin envisioning and implementing protective measures for your generative AI workloads.

  • Build An Efficient IT Foundation For Modern Business Success

    Sponsored by: Red Hat

    This Red Hat white paper outlines a five-step approach to modernize your IT infrastructure. The first step? Standardize your IT for consistency. Discover the next 4 steps in this white paper.

  • State of Application Security 2024

    Sponsored by: Cloudflare

    Today’s security practitioners and team leaders are responsible for protecting sensitive customer data and staying vigilant against a wide range of web app attacks and API abuse. Download the State of Application Security in 2024 to discover strategies for securing your web apps and APIs.

  • Future Proofing with Trusted AI

    Sponsored by: OpenText

    Explore how trusted AI practices can help organizations harness the full potential of AI while mitigating cybersecurity risks. Learn about enhancing trust through data security, access control, and application security measures. Download the white paper to discover strategies for future-proofing your AI investments.

  • Revolutionizing The Low-Code Experience: The Power Of Generative AI

    Sponsored by: ServiceNow

    Discover how generative AI can revolutionize low-code development and boost developer productivity. Learn about the 4 key forces driving GenAI adoption and 4 best practices for getting started. Read the full report to unlock the power of GenAI for your enterprise.

  • Toughening up web and mobile application security

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.