ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"

  • Decentralising datacentres: The new challenges of security at the edge

    Sponsored by: TechTarget ComputerWeekly.com

    In September 2020, the Computer Weekly Security Think Tank, our panel of information and cyber security experts, consideredthe challenges inherent in decentralising the datacentre, and set out to answer the question, how can security professionals ensure such setups are just as secure as the traditional centralised model? Read more in this e-guide.

  • A Computer Weekly buyer's guide to customer and employee experience management

    Sponsored by: TechTarget ComputerWeekly.com

    Businesses are facing new challenges to meet the expectations of customers and employees. In this 14-page buyer's guide, Computer Weekly looks at the benefits of the experience economy, the customer service implications of always-on mobile users and how digital platforms can engage customers across all channels.

  • Edge and Industrial IoT at Scale

    Sponsored by: SUSE

    In this 57-page Gorilla Guide you’ll learn how to employ best practices in edge computing that include the use of open source platforms, the integration of information technology (IT) and operations technology (OT) and the use of validated designs. Access the guide.

  • CW ASEAN: European data law - be aware and prepare

    Sponsored by: TechTarget ComputerWeekly.com

    Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.

  • CW Nordics ezine February 2018

    Sponsored by: TechTarget ComputerWeekly.com

    In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.

  • We Solved the Infrastructure Access Problem

    Sponsored by: StrongDM

    In this e-book, you’ll learn how several organizations, from growing startups to established enterprises, solved the access problem using StrongDM. Read now to access their case studies and see how you could follow in the footsteps of their success.

  • Technology industry at the cross-roads: Transforming quote-to-cash operations

    Sponsored by: TechTarget ComputerWeekly.com

    This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process.

  • Computer Weekly - 13 December 2022: AI experts question tech industry's ethical commitments

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the proliferation of ethical frameworks has done little to change how artificial intelligence is developed – we look at the challenges. We examine the future of the UK semiconductor sector as the government launches a review. And we hear how NatWest has put data at the heart of customer strategy. Read the issue now.

  • 2024 Buyer’s Guide to Load Balancing Solutions

    Sponsored by: Progress Software Corporation

    For organizations looking to optimize their application experience (AX) networking, load balancing is a key piece of the necessary IT infrastructure. This buyer’s guide is designed to give you the information you need to navigate the load balancing market, so that you can choose a solution, and deliver AX. Download now to unlock the roadmap.

  • The Total Economic ImpactTM Of Veeam with AWS

    Sponsored by: Veeam Software

    The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Veeam with AWS on their organizations.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.