ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"

  • How to achieve container security best practice

    Sponsored by: TechTarget ComputerWeekly.com

    In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.

  • How to achieve container security best practice

    Sponsored by: TechTarget ComputerWeekly.com

    In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.

  • Why implementing multiple carriers doesn’t achieve true network diversity

    Sponsored by: Sinch

    Network diversity is crucial for business continuity, but using multiple carriers doesn't always achieve true diversity. Learn how a single carrier with robust network architecture can provide reliable, redundant communications to keep your business connected. Read the full white paper to discover Sinch's approach to network diversity.

  • Assess & Manage Commercial Software Risk

    Sponsored by: ReversingLabs

    How do you know the commercial software you bring into your organization is safe? With Industry analysts seeing a 300% to 1000% increase in attacks targeting the commercial software businesses, it represents the largest under-addressed attack surface. Download this White Paper to learn more.

  • Supply chain management balance shifts from efficiency to resilience under Covid

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide explores these matters, beginning with a comprehensive article that ranges over supply chain management, from a macro level through how trading platforms have been flexed to switch suppliers rapidly down to how robots have been quickly deployed to solve problems of scale.

  • Computer Weekly – 31 January 2017: Visionary technology transforming healthcare

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, find out how a visionary approach to technology is transforming healthcare at London's world-leading Moorfields Eye Hospital. The UK tech sector has set out its priorities for the forthcoming Brexit negotiations – we take a look. And our new buyer's guide examines trends in datacentre management. Read the issue now.

  • VMware to Nutanix Migration Guide

    Sponsored by: Nutanix

    This e-book explores strategies to migrate from VMware to Nutanix, including seamless cloud migration, unified storage, and simplified management. Read on now to discover how Nutanix can help you increase flexibility, reduce complexity, and improve performance.

  • RetailX Europe Luxury 2024

    Sponsored by: Tealium

    As European luxury online sales have plateaued post-pandemic, the key to growth lies in understanding consumer preferences. Learn how to leverage data to enhance customer experiences and drive sales. Discover more insights in the full report.

  • Computer Weekly – 26 March 2024: What are IT buyers spending their money on?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal the technologies that IT buyers are spending their money on this year. The European CIO at PepsiCo explains how to make digital transformation go with a pop. And we look at the growing importance of cloud-to-cloud backup for data protection and resilience. Read the issue now.

  • SAP Cost Optimization on Cloud

    Sponsored by: Lemongrass

    Discover in this e-book how you can unlock cost savings in your mission-critical SAP landscape while maximizing operational resiliency.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.