ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"

  • Software-Defined Storage: A Guide to Successful Implementation

    Sponsored by: IBM

    In this expert e-guide, explore today's SDS implementation options and help you decide which one fits your needs best: commodity or custom hardware. Additionally, uncover the important considerations – like the specific needs of virtual environments, access points, and APIs – that you'll need to address when formulating your storage strategy.

  • CW Nordics - August-October 2021: Klarna alumni energise Stockholm's startup scene

    Sponsored by: TechTarget ComputerWeekly.com

    Klarna has not only grown into a well-known Swedish fintech brand, but former staff have gone on to create some of the Nordic region's new startup ventures. Find out more about the so-called 'Klarna academy'. Also read in this issue why growing tech companies in Stockholm say the city's startup environment needs to diversify more.

  • Digital identity strategies to enhance data privacy and protect networks

    Sponsored by: TechTarget ComputerWeekly.com

    The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.

  • Computer Weekly – 14 June 2022: Managing Apple Macs in the enterprise

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, with more people working remotely, the use of Apple Macs in the enterprise is growing – we look at how to manage them securely. Our latest buyer's guide examines security in the supply chain. And 10 years on from the London Olympics, we find out how data innovation is revitalising its legacy. Read the issue now.

  • Computer Weekly - 21 September 2021: The cities planning for ethical use of AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to tech leaders in Barcelona and London about a collaboration to ensure ethical use of AI in the era of smart cities. The UK government wants to reform data protection law – we assess the implications. And we examine the latest best practice in hybrid cloud. Read the issue now.

  • Examining the FTC's noncompete prohibition and how it affects healthcare

    Sponsored by: XtelligentMedia Healthcare

    The FTC recently prohibited noncompetes, a popular clause used in healthcare employment agreements, but legal challenges and clarifications are on the horizon.

  • CIO Trends #9: Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue we take a look at how three banks in Finland are working together so they can free up resources that will help them keep pace with the tech changes in the industry. Also in this issue we look closely at the cloud first policy at shipping giant Maersk.

  • Security analytics: Enabling organisations to get ahead of attackers

    Sponsored by: TechTarget ComputerWeekly.com

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

  • CW APAC – Trend Watch: Datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    Sustainability targets are becoming more pertinent than ever. In this handbook, focused on datacentres in the Asia-Pacific region, Computer Weekly looks at how firms are approaching the topic, why STT GDC is building its largest datacentre in the Philippines, OVHCloud's India project and the impact of generative AI.

  • SAN block access storage in the age of cloud and hyper-converged

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.