ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"

  • The Spreadsheet User’s Guide to Modern Finance Analytics

    Sponsored by: Alteryx

    As financial data grows in volume and complexity, the limits of spreadsheets become more obvious — they are manual, time-consuming, decentralized, and prone to human error. Read this e-book now to discover how to take the spreadsheet skills you already have and add the repeatability, speed, and security of analytics automation.

  • Computer Weekly – 20 March 2018: Where neuroscience meets technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.

  • Focus: Campus local area networks (LAN)

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we will explore some of the key trends driving the market for campus LANs and ask how to implement one, find out how one user went about building a network from the ground up on a brand-new site, and look in-depth at some of the active suppliers in the market.

  • Building an Analytics Campaign's Struggles and Successes

    Sponsored by: NEC Corporation of America

    In this expert e-guide, learn about some of the major issues facing modern analytics. Read about the initial struggle of launching an operational analytics program, and how integration with cloud solutions can help alleviate these pains. In addition, read about a travel-booking company's success story of BI cloud integration.

  • 2024 Threat Hunter Perspectives: Insights From The Front Lines

    Sponsored by: OpenText

    Insights from cybersecurity experts on the evolving threat landscape. Discover the latest adversary tactics, nation-state collaborations, and timing factors that enterprises must prepare for in 2024. Download the white paper to strengthen your security posture.

  • Jargon Buster Guide to Voice over IP (VoIP)

    Sponsored by: TechTarget ComputerWeekly.com

    In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.

  • Build Modern Applications on AWS eBook

    Sponsored by: AWS

    Take a look through this e-book to learn about building modern applications on AWS, and to see the success that working on AWS has delivered for businesses like Coca Cola.

  • It's hyper converged-with-everything in today's datacentre

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at the key hyper-converged vendors and their products, as well as hyper-converged tailored to disaster recovery, backup, cloud functionality, and the software-defined hyper-converged products available.

  • A Computer Weekly buyer's guide to Threat Management

    Sponsored by: TechTarget ComputerWeekly.com

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

  • A Better Toolkit for Finding and Converting More Real Leads

    Sponsored by: TechTarget

    Though foundational to B2B marketing, lead generation can pose a couple significant obstacles. Along with unpacking those challenges, this 21-page e-book by TechTarget maps out 3 tips for driving stronger leads from your business’s lead generation strategy. To access those insights and more, dig into the book.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.