ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"

  • Enhancing Teams with Enterprise-Grade Telephony

    Sponsored by: Vodafone

    Your business depends on a robust communications experience to drive innovation, and phone calls are at the heart of that experience. That means having the utmost quality in telephony becomes imperative for optimal performance. This eBook explores what to look for in the best telephony solutions. Read the eBook.

  • Computer Weekly - 1 March 2022: Post Office Horizon scandal enters public conscience - at last

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, 13 years after Computer Weekly first reported on flaws in the Post Office IT system, a public inquiry finally allows victims to reveal the devastating impact on their lives. Enterprises are starting to evaluate the uses of 5G. And we look at how SMEs have turned to e-commerce after the pandemic. Read the issue now.

  • 5 Common Audit Processes You Can Automate in One Week

    Sponsored by: Alteryx

    In this e-book, find out how to stop paying fines, fees, and the price of human error — while also enjoying faster results and scaling up more easily — by automating t5 key processes. Get your copy and empower your own analysts to blast through repetitive processes so they can deliver on time and in compliance.

  • 5 Common Audit Processes You Can Automate in a Week

    Sponsored by: Alteryx

    McKinsey reports that 60% of the audit process can be partly or fully automated, reducing error rates (up to 16%) and saving analysts 26 hours per week. In this e-book, learn how to avoid fines, fees, and human error while achieving faster, scalable results by automating 5 key processes.

  • How To Adopt Genai Today, And Revolutionize Your Tomorrow

    Sponsored by: Atos

    In this infographic, you'll learn to adopt Generative AI and transform your business. After reading, you will understand the three stages of GenAI adoption, from infrastructure to data expansion. Read on now to discover GenAI's power and find out how Atos and Microsoft can help prepare you to unlock its potential.

  • MicroScope – March 2023: Steering the storage market

    Sponsored by: MicroScope

    In this issue, read all about how the storage world is continuing to evolve as it looks to the cloud, security and ESG compliance requirements. Also discover six steps to making your business more sustainable and read about how IBM's channel boss is set to make a difference.

  • Computer Weekly – 27 June 2023: The politics of AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, Rishi Sunak and Keir Starmer both spoke at London Tech Week to present their visions of an AI future for the UK – we compare their plans. We talk to the CTO of chip giant AMD about making tech more energy efficient. And we look at optimising networks for hybrid working. Read the issue now.

  • 2023 Network IT Management Report: Evolving IT to Manage the New Network

    Sponsored by: Auvik Networks, Inc.

    To find out how 4,500 IT professionals approached network IT management in 2023, review this 23-page research report.

  • The Frightening Realities of Your SDR Program ... and What to Do About Them

    Sponsored by: TechTarget

    To compete for pipeline in their markets, companies have had to add more and more SDRs to their prospecting program. This e-book, The Frightening Realities of Your SDR Program ... and What to Do About Them, explores recent research that highlights key failures and how to go about solving them. Download your copy to get started.

  • Urban Myths About Secure Coding

    Sponsored by: Veracode, Inc.

    Urban myths, whether rooted in reality or fabricated entirely, have the power to change perception. Read this e-book which is designed to rectify these misconceptions by presenting six common urban myths about secure coding and giving practical guidance for how to overcome them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.