ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"

  • A Computer Weekly buyer's guide to edge computing

    Sponsored by: TechTarget ComputerWeekly.com

    Edge computing is currently one of the most important trends in IT. It is more likely to complement cloud by supporting workloads that are latency sensitive, require a lot of compute power, or involve large data volumes. In this 15-page buyer's guide, Computer Weekly looks at the potential of harnessing compute power at the edge.

  • Why Businesses Must Plan for Succession

    Sponsored by: Paycom

    Succession planning is critical, yet only 21% of companies have a plan in place. This guide offers 7 strategies to prepare, including starting loose, checking egos, and developing talent. Plan now so your business can thrive for decades. Read the full white paper for insights to ensure continuity.

  • MicroScope – July 2021: Life on the edge

    Sponsored by: MicroScope

    With opportunities around edge computing on the up, we ask experts to weigh in on how the channel can approach using the tech to its advantage. Also discover how to encourage employees to take cyber security lessons seriously, and how collaboration is key to growth this year

  • Top 10 network stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    2018 was the year when software-defined networking, and more specifically software-defined WANs, took centre stage. We look back at a transformative year for the world of the network manager. Here are Computer Weekly's top 10 networking stories of 2018.

  • Palo Alto Networks Special Edition: XDR

    Sponsored by: Palo Alto Networks

    With the combination of too many alerts and too little context, you could lose visibility and control. Ultimately, your company becomes even more at risk as a result. Access this e-book, XDR for Dummies, to learn 10 key XDR capabilities and features, XDR use cases and more.

  • MicroScope: The digital transformation

    Sponsored by: MicroScope

    The phrase might be one that gets over used at conferences and in pitches but it refers to something that is really happening and to revenue opportunities that are emerging right now. This e-guide will share some of the recent developments in the channel and the latest thoughts about the issue.

  • Computer Weekly – 9 July 2019: Steering a voyage to the cloud at Maersk

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the world's largest shipping company, Maersk, is steering a course to public cloud. We analyse SAP's latest attempts to ease customers' software licensing concerns. And we hear how one London borough, Hackney, is taking a lead in transforming digital government across the capital. Read the issue now.

  • MicroScope – November 2023: Team up for peak success

    Sponsored by: MicroScope

    In this issue, we explore the need to handle pitches and collaboration carefully to create more opportunities as an increasing amount of IT spending goes via partners. Also discover Canalys' predictions for the use of generative AI, and just what exactly it means when we talk 'cyber security'

  • Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.

  • Atlassian Cloud Architecture And Operational Practices

    Sponsored by: Atlassian

    This white paper explores Atlassian's cloud architecture and operational practices, including their use of AWS, availability zones, data backups, and security controls. Read on now to learn how Atlassian ensures tenant separation and data encryption to safeguard customer data in the cloud.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.