Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"
-
The Spreadsheet User’s Guide to Modern Finance Analytics
Sponsored by: AlteryxAs financial data grows in volume and complexity, the limits of spreadsheets become more obvious — they are manual, time-consuming, decentralized, and prone to human error. Read this e-book now to discover how to take the spreadsheet skills you already have and add the repeatability, speed, and security of analytics automation.
-
Computer Weekly – 20 March 2018: Where neuroscience meets technology
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
-
Focus: Campus local area networks (LAN)
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we will explore some of the key trends driving the market for campus LANs and ask how to implement one, find out how one user went about building a network from the ground up on a brand-new site, and look in-depth at some of the active suppliers in the market.
-
Building an Analytics Campaign's Struggles and Successes
Sponsored by: NEC Corporation of AmericaIn this expert e-guide, learn about some of the major issues facing modern analytics. Read about the initial struggle of launching an operational analytics program, and how integration with cloud solutions can help alleviate these pains. In addition, read about a travel-booking company's success story of BI cloud integration.
-
2024 Threat Hunter Perspectives: Insights From The Front Lines
Sponsored by: OpenTextInsights from cybersecurity experts on the evolving threat landscape. Discover the latest adversary tactics, nation-state collaborations, and timing factors that enterprises must prepare for in 2024. Download the white paper to strengthen your security posture.
-
Jargon Buster Guide to Voice over IP (VoIP)
Sponsored by: TechTarget ComputerWeekly.comIn this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
-
Build Modern Applications on AWS eBook
Sponsored by: AWSTake a look through this e-book to learn about building modern applications on AWS, and to see the success that working on AWS has delivered for businesses like Coca Cola.
-
It's hyper converged-with-everything in today's datacentre
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we look at the key hyper-converged vendors and their products, as well as hyper-converged tailored to disaster recovery, backup, cloud functionality, and the software-defined hyper-converged products available.
-
A Computer Weekly buyer's guide to Threat Management
Sponsored by: TechTarget ComputerWeekly.comThreat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
-
A Better Toolkit for Finding and Converting More Real Leads
Sponsored by: TechTargetThough foundational to B2B marketing, lead generation can pose a couple significant obstacles. Along with unpacking those challenges, this 21-page e-book by TechTarget maps out 3 tips for driving stronger leads from your business’s lead generation strategy. To access those insights and more, dig into the book.