ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"

  • MicroScope E-Zine: January 2017

    Sponsored by: MicroScope

    Is the year ahead a bright one for channel? In this January 2017 edition of MicroScope E-zine, uncover the key expectations for channel in 2017.

  • Computer Weekly –25 April 2017: Blockchain expands reach beyond finance

    Sponsored by: TechTarget ComputerWeekly.com

    Discover how blockchain, the tech behind bitcoin, is extending its reach beyond financial services into new industries. Also learn from developers about the pros and cons of componentizing application software, examine what a recent court case shows about Oracle's licensing policies, and more.

  • 2024 Threat Hunter Perspectives: Insights From The Front Lines

    Sponsored by: OpenText

    Insights from cybersecurity experts on the evolving threat landscape. Discover the latest adversary tactics, nation-state collaborations, and timing factors that enterprises must prepare for in 2024. Download the white paper to strengthen your security posture.

  • SD-WAN: Accelerating network transformation in APAC

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about SD-WAN's momentum in the Asia-Pacific region, and how the technology can support the requirements of a multi-cloud environment.

  • SD-WAN: Accelerating network transformation in APAC

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about SD-WAN's momentum in the Asia-Pacific region, and how the technology can support the requirements of a multi-cloud environment.

  • Computer Weekly – 8 November 2022: How the US-China chip war will affect IT leaders

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the US ramps up semiconductor sanctions on China, we examine the ramifications across the tech sector. Cyber criminals are turning to new forms of encryption – we talk to the Dutch researchers trying to catch them. And we look at what cloud providers need to do to improve customer experience. Read the issue now.

  • Ransomware Mitigation and Recovery

    Sponsored by: Pure Storage

    As the threat landscape continues to evolve, cybercriminals are becoming increasingly bold and sophisticated with ransom amounts surging. Simply put, there’s no time like the present to prioritize your ransomware threats, detection, and response efforts. Read on now to find out how you can help your organization stay ahead of hackers.

  • Private cloud management: What enterprises need to know in 2021

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a look at how one company has negotiated the move from private to public cloud, while also shining a light on the challenges enterprises face when running private cloud environments and what they can do to overcome them.

  • CW ASEAN – September 2018: Time to clear DevOps hurdles

    Sponsored by: TechTarget ComputerWeekly.com

    ASEAN organizations are generally aware of the benefits of DevOps, but lesser known are the pathways to success. What would an organization that has successfully implemented DevOps look like?

  • Quantifying the Value of FlexPod Converged Infrastructure

    Sponsored by: NetApp & Cisco

    Learn how upgrading your converged infrastructure to FlexPod with Cisco M4 servers and All Flash FAS (AFF) storage can benefit your organization

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.