ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"

  • AI in the UK: The only way is ethics

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we explore how enterprises must confront the ethical implications of AI use as they increasingly roll out technology that has the potential to reshape how humans interact with machines. We also shed a little light on the use of AI within politics - specifically through the controversial Brexit campaign.

  • Charting Cloud's Next Phase: Accelerating Modernization

    Sponsored by: AWS & Softserve

    Enterprises need a solution that delivers on key business priorities like optimized costs, improved security, and faster time to market. In this white paper, you'll learn how SoftServe's App Modernization Platform can simplify and accelerate your cloud migration and modernization journey. Read on now to learn more.

  • 2024 State of Application Security Report

    Sponsored by: CrowdStrike

    8 of the top 10 data breaches of 2023 were related to application attack surfaces. This report synthesizes data collected from a survey of application security professionals to reflect the current state of application security, condensing the findings into 8 key takeaways. Download now to learn more.

  • A Computer Weekly buyer's guide to supply chain resilience

    Sponsored by: TechTarget ComputerWeekly.com

    The Covid-19 pandemic has put the limits of the supply chain to the test. In this 18-page buyer's guide, Computer Weekly looks at how supply chain management has changed since, what action has been taken to handle it, and why data and automation is enhancing adaptability.

  • Legacy PKI Migration

    Sponsored by: Venafi

    52% of the 2500 participants surveyed by the Ponemon Institute reported that their organizations have poor visibility of apps that rely on Public Key Infrastructure (PKI). Along with exploring that obstacle, this white paper considers other challenges that legacy PKI can pose. To unlock those insights and more, read on.

  • 4 Essential Cloud Project Questions

    Sponsored by: Red Hat

    For cloud and IT projects to hit their targets for efficiency, productivity, and even cost controls, IT leaders should evaluate the assumptions that underlie their project planning. Learn 4 questions to ask yourself before starting your next cloud project in this white paper from Red Hat.

  • Computer Weekly – 1 October 2019: The most influential women in UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.

  • Premier Fortune 500® Technology Company Saves 30% on IT

    Sponsored by: ARG, Inc.

    Mergers and acquisitions create turmoil in organization’s IT. To help a Fortune 500 company smooth their transition after acquiring a new organization, they turned to ARG. Access the case study here to learn how they more than doubled their initial goal to reduce network spending by 15%.

  • COVID-19 in APAC:Tech industry lessons & innovations

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read about the impact of the COVID-19 outbreak on the APAC tech sector, what tech vendors in the region are doing to support organisations during this difficult period and how the pandemic could spur businesses to dial up their digitisation efforts.

  • How open source is spurring digital transformation

    Sponsored by: TechTarget ComputerWeekly.com

    From Linux to Kubernetes, open source has been key to efforts by organisations across APAC to transform digitally. In this e-guide, read how Malaysia's AmBank is using open source to engineer its software from the ground-up, ANZ Bank's move to Red Hat OpenShift, and what suppliers are doing to support deployments of containerised applications.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.