ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"

  • CW Benelux - August-October 2021: Netherlands sees increase in the number of women opting for an ICT career

    Sponsored by: TechTarget ComputerWeekly.com

    The IT skills gap in the Netherlands could be about to narrow as more women take up jobs in the sector. Figures from last year revealed that the number of female ICT professionals grew by 6.5%, while the number of male ICT professionals increased by only 1.7%. Read more about it in this issue.

  • A Computer Weekly buyer's guide to continuous integration and continuous deployment

    Sponsored by: TechTarget ComputerWeekly.com

    Continuous integration and continuous deployment offer a variety of advantages for software developers. In this 13-page buyer's guide, Computer Weekly looks at what changes are in its pipeline, assesses the cultural changes it brings and how it can deliver results at speed.

  • Top 10 Nordic IT stories of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    The Nordic region offers the world a melting pot of tech, with its huge traditional industries and world-leading tech startup hubs.  In this eguide, read about the unique mix of features in the Nordic countries that means traditional businesses and consumers are willing to apply new technology to problems big and small.

  • AI-Driven Data Centers: Revolutionizing Decarbonization Strategies

    Sponsored by: Schneider Electric

    Data centers are crucial for decarbonization by enabling electrification and digitization across industries. This white paper explores how AI-driven data centers can revolutionize sustainability strategies and reduce global emissions. Read the full white paper to learn more.

  • Computer Weekly – 10 July 2018: Tackling the digital identity problem

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as UK government attempts to create a digital identity standard flounder, we examine progress on establishing the online ID system the digital economy needs. Barclays bank talks about its move to DevOps and public cloud. And we find out how AI could help improve IT service management. Read the issue now.

  • Recap: Splunk.conf 18

    Sponsored by: TechTarget ComputerWeekly.com

    Download this e-guide for coverage of Splunk.conf 2018, looking into subjects such as security automation, data-driven pre-emptive maintenance and why diversity is so important when developing the technologies of the future.

  • Essential Guide: How APAC firms can ride out the pandemic

    Sponsored by: TechTarget ComputerWeekly.com

    In this Essential Guide, we examine the impact of Covid-19 on Asia-Pacific businesses, and how they have responded from a technology perspective by driving initiatives spanning digital transformation, business continuity, cloud, cyber security and remote working.

  • UCaaS Buyers’ Checklist

    Sponsored by: 8x8

    The best unified communications as a service (UCaaS) tools offer a range of transformative capabilities, from personalized meeting rooms to built-in security and encryption. Use this checklist to benchmark the most important features against your organization’s UCaaS requirements.

  • Serving up server hardware

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, find out why some companies are still hanging on to older hardware, the pros and cons of different types of server hardware, and what one Chinese tech giant is doing in the microprocessor space.

  • Focus: Enterprise Mobility Management

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will explore exactly enterprise mobility management, looking in-depth at some of the key trends and developments in the world of enterprise mobility, as well as keeping a watchful eye on cybersecurity.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.