ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"

  • CW ANZ: Trend Watch - communications infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how Australia's bushfires impacted its telecoms networks and the increase in SD-WAN adoption in Asia-Pacific

  • World Economic Forum Global Risks Report 2018

    Sponsored by: TechTarget ComputerWeekly.com

    The World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda.

  • CW EMEA - November 2023: Let the data flow

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's CW EMEA ezine, we find out about Heineken's mission to make the most out of the data it holds through an enterprise-wide data ecosystem. We also look at how the UK has turned its back on the German government-funded Gaia-X data platform. Read the issue now.

  • Critical Scalability: Trend Micro Security Predictions for 2024

    Sponsored by: Trend Micro

    To review security predictions for 2024 – which concern generative AI, machine learning models and much more – tap into this 19-page research report by Trend Micro.

  • Google Cloud in the Enterprise: What you need to know

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we provide a round-up of everything that took place at 2018's Google Cloud Next, including a run through of all the key announcements made at the show and what they mean for the enterprise.

  • SIEM, SOAR or both? Our security experts weigh in

    Sponsored by: TechTarget ComputerWeekly.com

    In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).

  • Three Innovative Technologies To Address UPS Challenges At The Edge

    Sponsored by: Schneider Electric

    In this e-book, you'll learn how wide-bandgap, lithium-ion, and cloud-based UPS technologies can address common edge computing challenges like limited space, frequent battery replacements, and lack of visibility. Read on now to learn more and discover the benefits of the APC Smart-UPS Ultra.

  • Kubernetes: What enterprises need to know

    Sponsored by: TechTarget ComputerWeekly.com

    It is fair to say after years of debate over which technology – out of Docker and Kubernetes –  enterprises would end up favouring when it comes to containerising their apps that the latter has very much won that battle.

  • From Patchwork To Platform

    Sponsored by: Red Hat

    This e-book examines the differences between upstream Ansible and Red Hat Ansible Automation Platform, a hardened and supported enterprise solution. Learn how the platform can enhance security, scalability, and ROI for your organization's automation needs. Read the full e-book to discover the benefits of enterprise-grade automation.

  • Top 10 ANZ IT stories of 2022

    Sponsored by: TechTarget ComputerWeekly.com

    In this roundup, Computer Weekly recaps the top 10 stories in Australia and New Zealand (ANZ), including the opportunities and challenges that organisations in the region have faced over the past year.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.