Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"
-
The Six Principles Of AI-Ready Data Establishing A Trusted Data Foundation For AI
Sponsored by: QlikIn this white paper, you'll find out how to establish a trusted data foundation for AI with 6 key principles: data must be diverse, timely, accurate, secure, discoverable, and consumable by machine learning and large language models. Read on now to learn how you can unlock your organization's AI potential.
-
MicroScope: The digital transformation
Sponsored by: MicroScopeThe phrase might be one that gets over used at conferences and in pitches but it refers to something that is really happening and to revenue opportunities that are emerging right now. This e-guide will share some of the recent developments in the channel and the latest thoughts about the issue.
-
A Computer Weekly buyer's guide to cloud enterprise applications
Sponsored by: TechTarget ComputerWeekly.comBusinesses require suitable cloud applications to manage their processes effectively. In this 17-page buyer’s guide, Computer Weekly looks at the advantages of best-of-breed SaaS products, explores the rise of industry cloud and assesses its value in the corporate IT sector.
-
VMworld Europe 2016: What to expect
Sponsored by: TechTarget ComputerWeekly.comVMworld Europe 2016 hits Barcelona in October, with VMware expected to announce new and refreshed products and services in support of its end-user computing and cloud strategy. In this e-guide, you'll find case studies featuring last year's winners, along with articles covering the technologies VMware looks set to champion at this year's event.
-
Why Businesses Must Plan for Succession
Sponsored by: PaycomSuccession planning is critical, yet only 21% of companies have a plan in place. This guide offers 7 strategies to prepare, including starting loose, checking egos, and developing talent. Plan now so your business can thrive for decades. Read the full white paper for insights to ensure continuity.
-
Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
-
Computer Weekly – 14 August 2018: Infrastructure under attack
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.
-
Top 10 network stories of 2018
Sponsored by: TechTarget ComputerWeekly.com2018 was the year when software-defined networking, and more specifically software-defined WANs, took centre stage. We look back at a transformative year for the world of the network manager. Here are Computer Weekly's top 10 networking stories of 2018.
-
Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.
-
Data governance more important now than ever
Sponsored by: TechTarget ComputerWeekly.comAs organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.