ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Declarative Device Management (DDM) DDM’s Impact On Modern Management Is Hard To Overstate.

    Sponsored by: JAMF

    As the modern workplace changed, organizations changed the way they manage devices to a more flexible, more portable and more secure model: modern management. But it wasn’t until Apple released declarative device management (DDM), that the future of modern management could be fully realized. Read this white paper to learn more.

  • The top 5 generative AI questions on every executive’s mind

    Sponsored by: AWS

    Generative Al is changing daily, making it increasingly critical for every business to learn what it can do and how it fits into their operations. View “The Top 5 Generative AI Questions on Every Executive’s Mind,” an infographic from AWS, to quickly build your understanding & accelerate adoption at your organization.

  • Before Tackling Secure Texting In Healthcare, Change Your Company Culture

    Sponsored by: AVST

    In this expert e-guide, learn why the first step to secure communications technology (like texting) is convincing leaders and clinicians to recognize the risks to health data.

  • MicroScope – November 2023: Team up for peak success

    Sponsored by: MicroScope

    In this issue, we explore the need to handle pitches and collaboration carefully to create more opportunities as an increasing amount of IT spending goes via partners. Also discover Canalys' predictions for the use of generative AI, and just what exactly it means when we talk 'cyber security'

  • Simplified Image Optimization

    Sponsored by: Fastly

    If you’re looking for better performance, faster load times, plus cost savings, and productivity improvements for your team, this e-book explores why you should consider Fastly’s Image Optimizer. Download this ebook now and start your journey to a faster, more engaging web experience.

  • Computer Weekly – 4 October 2022: Putting APIs to work

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.

  • Preventing identity theft in a data breach

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.

  • Addendum Buyer’s guide checklist

    Sponsored by: SailPoint Technologies

    In a market filled to the brim with solutions, how do you know which access management solution is right for your organization? This white paper provides checklists for evaluating solutions, including sets of qualifying questions which can be used to evaluate solutions across a set of criteria required. Read on to learn more.

  • The changing role of the CIO

    Sponsored by: TechTarget ComputerWeekly.com

    Read this e-guide on the changing role of the CIO to learn about the challenges and opportunities facing modern CIOs and the leadership skills they need to stay relevant in a digital age.

  • CW APAC, May 2022: Trend Watch: Datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on datacentres in the Asia-Pacific region, Computer Weekly looks at the shift towards colocation facilities.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.