ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"

  • 7 Reasons Rancher is the Enterprise Container Management Platform You Need

    Sponsored by: SUSE

    Container adoption is surging, and Kubernetes has become the go-to for managing container workloads. Yet, Kubernetes' complexity at scale is daunting. This white paper delves into how Rancher simplifies Kubernetes deployment and management. Read the white paper for 7 reasons why you should consider Rancher for your container management.

  • Computer Weekly – 29 March 2022: Ten years of the Raspberry Pi

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the Raspberry Pi reaches its 10th anniversary, we look back on how the low-cost computing device went from schools to supercomputers and even into space. Gartner offers tips on how to motivate IT staff in a hybrid working environment. And we meet the Dutch hackers helping to secure the internet.

  • Full visibility and real-time threat response: Helping retailers achieve proactive IT Security

    Sponsored by: Tanium

    Hackers are targeting blind spots and vulnerabilities in the complex, multi-tooled IT systems that retailers depend on. And rather than physical goods, threat actors are stealing valuable data. Discover how adopting a converged endpoint management solution with full visibility of assets can help retailers mitigate and prevent data breaches.

  • Computer Weekly – 14 January 2020: Building the internet of the future

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, Cisco unveils the $5bn platform that it believes will be the future of the internet – we look through the details. The McLaren Formula One team discusses how IoT and data analytics have been key to its revival on the track. And we examine the importance of diversity in software development. Read the issue now.

  • A Computer Weekly buyer's guide to containerisation in the enterprise

    Sponsored by: TechTarget ComputerWeekly.com

    Containerisation is becoming a key part of IT strategy. In this 12-page buyer's guide, Computer Weekly looks at how it can help businesses in a post-pandemic world, assesses the main considerationsfor Kubernetes backup and discusses how to manage enterprise-class containerisation.

  • A Computer Weekly Buyer's Guide to SAP Hana Deployment

    Sponsored by: TechTarget ComputerWeekly.com

    SAP's Hana in-memory data platform promises to transform business processes. In this 11-page buyer's guide, Computer Weekly looks at how Hana is changing traditional SAP architecture, how it has streamlined customer services for one business, and why there is confusion over Hana implementation.

  • MicroScope - January 2020: SMEs and managed services

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of MicroScope, we look at the channel opportunity in the SME customer base as they look for managed services support, our roundtable discussion looks at the transformative appeal of unified communications, and consider why software development houses are switching to no-code. Read the issue now.

  • Mastering Hybrid Cloud Backup Costs, Security and Management

    Sponsored by: Veeam Software

    Unlock cost-effective hybrid cloud backup strategies. Learn to secure data and improve efficiency with expert tips in this e-book.

  • Computer Weekly - 7 September 2021: Highways England delivers a digital roadmap

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the CDIO of Highways England about her digital services and asset management plans. We also explore SIEM and SOAR security tools and we find out how McLaren Racing is using data analytics to build its cars more efficiently. Read the issue now.

  • Top Priorities for Evaluating Microsegmentation Solutions

    Sponsored by: Akamai Technologies

    This report from Enterprise Strategy Group (ESG), in partnership with Akamai, offers a detailed explanation of how to prioritize microsegmentation evaluation decisions. It provides the eight key priorities to consider when selecting solutions, as well as research on microsegmentation adoption in the marketplace.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.