ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Gain a Competitive Edge with Evergreen//One

    Sponsored by: Pure Storage

    Unlock the power of cloud economics with Evergreen//One, an enterprise-grade Storage-as-a-Service solution. Gain a competitive edge with high performance, uptime, and energy efficiency. Read the product overview to learn how Evergreen//One could transform your sustainable data storage strategy.

  • Jargon Buster Guide to Post Quantum Cryptography

    Sponsored by: TechTarget ComputerWeekly.com

    This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.

  • Computer Weekly – 15 August 2023: How does your salary stack up?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal our annual salary survey, comparing IT professionals' pay and attitudes to their job – how does yours stack up? The new digital chief at DWP discusses AI, data modernisation and shaking up the tech behind the benefits system. Read the issue now.

  • MicroScope: Chart course to Covid-19 recovery

    Sponsored by: MicroScope

    Customers have had to react to changes caused by the pandemic, so what decisions have they made in the past year? In this issue, we explore how businesses have adapted to the new normal, different approaches to remote working, and take a look at the challenge of sustainability

  • November ezine: Peer-to-peer lending

    Sponsored by: MicroScope

    Credit always matters in the channel and peer-to-peer lending might just be the alternative some have been looking for

  • How to Manage SAP User Accounts and Access Rights with Identity Manager

    Sponsored by: One Identity

    Learn how Identity Manager can streamline user administration for the SAP ecosystem, including on-premises and cloud offerings. Manage user identities, privileges and security across the enterprise with integrated IAM. Read this white paper to see the benefits.

  • APAC career guide: Becoming a cyber security pro

    Sponsored by: TechTarget ComputerWeekly.com

    Once the sole domain of highly technical geeks poring over security logs to look for signs of hackers lurking in their networks, cyber security has become more multi-dimensional and varied across specialisations, organisations and industries. In this e-guide, learn what it takes to become a successful cyber security pro in APAC.

  • CW Benelux - May-July 2022: Meta shelves hyperscale datacentre plan in Netherlands

    Sponsored by: TechTarget ComputerWeekly.com

    Meta's plan for a hyperscale datacentre in the Netherlands which was to serve the metaverse world has been halted following a campaign by environmentalists and the Dutch parliament's call for the government to do everything in its power to stop the facility being built. Read about it in this issue of CW Benelux.

  • MicroScope – May 2022: Charging at SME security challenges

    Sponsored by: MicroScope

    With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working

  • Computer Weekly – 7 March 2023: Can the UK keep its fintech crown?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, two years after the Kalifa report laid out a roadmap for continued fintech sector growth, UK entrepreneurs and startups are worried about the lack of progress. We look at the top tech trends in retail and find out which companies are leading the way. And we examine six ways to slash IT emissions. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.