ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • 3 Steps to Calculate Total Enterprise IT Energy Consumption Using DCIM

    Sponsored by: Schneider Electric

    Download this white paper for a straightforward, “how to get started” guide that identifies the fundamental data points to start with and gives a simple 3-step framework to start measuring the environmental impact of the IT estate.

  • Who should get the technology vote in the UK General Election?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we take an in-depth look at the technology and digital policies in the main political parties' election manifestos. We examine the rise of alternatives to relational databases that better support a big data environment. And we assess the security issues around container technology. Read the issue now.

  • Jargon buster guide to GDPR

    Sponsored by: TechTarget ComputerWeekly.com

    In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.

  • Tethering Brand and Buyer Differentiating Your Brand in an Evolving B2B Environment

    Sponsored by: TechTarget

    Discover in this TechTarget white paper the latest hurdles facing digital marketers in the B2B space, and learn how your organization can overcome them.

  • Identity security fundamentals

    Sponsored by: SailPoint Technologies

    Providing fast, accurate access to digital resources for those who need it is essential for organizations to secure business and gain a competitive edge. This e-book will review the fundamentals of identity security and discuss how identity security best protects critical assets. Read on to learn more.

  • CW Buyer's Guide to 5G mobile networking

    Sponsored by: TechTarget ComputerWeekly.com

    5G mobile networking has the potential to propel business into the future. In this 17-page buyer's guide, Computer Weekly looks at how to optimise 5G, the advantages of advanced communications and what Télécoms Sans Frontières has achieved through harnessing it.

  • Executive Insights: Scoping out Sustainability

    Sponsored by: Schneider Electric

    In this e-book, take a deep dive into the importance of environmental responsibility in the data center, demystify Scope 3, and take a look at the sustainability software available today.

  • CW APAC - June 2021: Career guide to cloud computing

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at the skills required for cloud professionals to succeed in an evolving industry, the risk to jobs posed by automation and the disciplines being taught at Future Tech Academy

  • Liberate Data and Modernize your Network for AI and LLM with Aviatrix

    Sponsored by: Aviatrix Systems

    Aviatrix's cloud networking platform enables enterprises to secure and optimize hybrid networks for AI and large language model workloads. It provides high-performance encryption, deep observability, and cost savings. Learn more about Aviatrix's cloud networking solutions.

  • Master Data Management Strategy Template (eBook)

    Sponsored by: Semarchy

    This Master Data Management Strategy Template provides a comprehensive framework for organizations to successfully establish and maintain a robust MDM program to facilitate data-driven decisions for continuous improvement. Read on to get started.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.