ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"

  • CW APAC: Tech career guide – women in IT

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on tech careers for women in the Asia-Pacific region, Computer Weekly looks at what can be done to attract more women into software development.

  • Computer Weekly – 30 January 2024: Tech companies warn EU over encryption plans

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, tech companies are calling on the European Commission to rethink plans to weaken internet encryption – we explore the issues. We talk to credit rating agency Moody's about why it thinks now is the time to invest in quantum computing. Read the issue now.

  • Automating routine IT tasks smartly

    Sponsored by: TechTarget ComputerWeekly.com

    From simple scripts to programmable infrastructure, automation saves IT admins a huge amount of time repeating tasks. Additionally, machine learning be used to understand normal application behaviour and take actions automatically if things are out of kilter. But sometimes a simpler approach is all that is needed.

  • Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.

  • Computer Weekly – 24 September 2019: Climate change – the challenge for datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the impact of climate change on datacentres as potential victims and contributors to the problem. We look at the rise of voice channels and how IT leaders can use the technology for better customer experience. And we ask what lessons must be learned from Ecuador's citizens' data breach. Read the issue now.

  • AI proves value in HR, but handle with care

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, discover how the allocation of work by algorithm might have advantages for workers as well as employers, how AI is proving its value for HR and how data analytics is being used to support expansion and development.

  • LevelBlue Futures™ Report 2024

    Sponsored by: AT&T and LevelBlue

    This 2024 research uncovered the relationships between the barriers to cyber and cybersecurity resilience and how the business prioritizes them. Get your copy of the report to learn what’s on the horizon that may impact cyber resilience, five steps for prioritizing cyber resilience, and more.

  • Computer Weekly – 19 February 2019: When is it best to stick with paper?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, sometimes going digital is not necessarily the best thing to do – we weigh the pros and cons of paper versus technology. Our new buyer's guide examines the challenges of asset management as you move to the cloud. And we look at the growing role of software developers in the future of networking. Read the issue now.

  • Paper free – are we there yet?

    Sponsored by: TechTarget ComputerWeekly.com

    In this comprehensive report, AIIM Market Intelligence takes an in-depth look at the amount of paper in the office, the impediments to removing it, the take up of digital mailrooms and multi-channel capture, and the increasing exploitation of mobile and cloud.

  • Computer Weekly – 30 August 2016: Get protected

    Sponsored by: TechTarget ComputerWeekly.com

    It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.