ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"

  • White Paper Transform your IT with AWS

    Sponsored by: T-Systems

    Many cloud migrations fail not because of technology, but rather because of established business processes or the corporate culture. The goal of a cloud migration should not be transforming your technology, but rather transforming the business. Read on to learn about best practices you can leverage to successfully tackle your cloud migration.

  • A Roadmap to Digital Resilience for the Enterprise

    Sponsored by: Splunk

    Most organizations experience around 10 days of unplanned downtime per year. That’s a lot of lost revenue and damaged reputation. At a time when organizations are no longer indistinguishable from the digital systems they rely on, digital resilience is truly enterprise resilience. Download your complimentary copy of the report to learn more.

  • ITOps & service management: The state of play in APAC

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide on ITSM in APAC, find out how to keep IT operations running to empower a remote workforce, the advantages of cloud-based service management tools and how one Australian company is managing IT incidents amid a shorter development lifecycle.

  • Computer Weekly – 7 November 2017: The ethics of software development

    Sponsored by: TechTarget ComputerWeekly.com

    Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.

  • Red Hat Ansible Automation Platform A beginners guide

    Sponsored by: Red Hat

    80% of organizations say that adopting IT automation is “extremely important” to the future success of their organization, according to Harvard Business Review. This white paper serves as a guide for the Red Hat Ansible Automation Platform. Dive into the guide today.

  • A Buyers Guide to Cyber Insurance

    Sponsored by: WatchGuard Technologies, Inc.

    With cyberattacks on the rise, the demand for cyber insurance is skyrocketing.But with so many classifications and options, how do you know what to look for? This buyer’s guide highlights and breaks down the key types of cyber insurance to give you a stronger understanding of what to look for in a solution. Download now to learn more.

  • Intent-Guided Multithreading Tactics That Work

    Sponsored by: TechTarget

    As buyers become more digital, sellers must evolve their tactics. This white paper explores using intent-guided multithreading to identify and engage buying teams earlier, accelerate opportunities, and deliver high-value meetings that drive pipeline. Read the full white paper to learn more.

  • Customer Experience Intelligence Report IN

    Sponsored by: ServiceNow

    66% of customers consider taking their business elsewhere when an issue is not resolved within 3 days. This can be problematic, given the average of 3.9 days for companies to resolve a problem, and tends to lead to customers switching brands. So, what can organisations do to improve their customer service? Browse this report to learn more.

  • CW APAC - February 2022: Trend Watch - enterprise 5G

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on enterprise 5G in the Asia-Pacific region, Computer Weekly looks at what the technology means for enterprises across the region.

  • Computer Weekly - 10 September 2024: The flight to data success

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how Manchester Airport Group has set course to become the world's most intelligent airport through its data-led approach. We also look at failings of AI initiatives as the tech hits roadblocks, as well as take a peak at what support networks are available to those new in the CISO role. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.