ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"

  • Computer Weekly - 2 November 2021: What the Budget means for UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look through the chancellor's Autumn Budget and Spending Review to find what it means for the UK tech sector. As COP26 starts, we assess the green credentials of the IT industry. And we hear one CTO's experiences of learning the privacy lessons of GDPR. Read the issue now.

  • Cloud Performance Report: 2022 Edition

    Sponsored by: Cisco ThousandEyes

    In order to understand the state of cloud performance, Cisco Thousand Eyes performed measurements through vantage points connected to Tier 2, Tier 3, as well as cloud backbone networks. This report provides an analysis of the performance and connectivity architectures of the top 3 public cloud providers. Read on to learn more.

  • Computer Weekly – 14 November 2023: The UK AI Safety Summit – what did it achieve?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look back at the UK government's AI Safety Summit and assess what it achieved – and what it didn't. Our latest buyer's guide examines the future of business software and modernising legacy applications. And we find out how the UK PSTI Act aims to protect your smart devices. Read the issue now.

  • CW EMEA – February 2023: Kyiv is ready for anything

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of CW EMEA, the CIO at Kyiv City Council explains how its IT team has kept services running for residents amid relentless bombing by Russia. We also look at the Netherlands’ plans to regulate AI to reduce bias, how highly accurate time protocols ensure fair trading, and the use of tech in agriculture in Denmark. Read the issue now.

  • A Computer Weekly Buyer's Guide to Application Development and DevOps

    Sponsored by: TechTarget ComputerWeekly.com

    Harnessing the right developer tools offers new advantages for businesses. In this 14-page buyer's guide, Computer Weekly looks at the benefits and limitations of the DevOps approach, what Microsoft is doing with its developer platform and the rise of the holistic application.

  • The Why, How, What of VMware Migration

    Sponsored by: AWS & Brillio

    In this e-book, you'll discover the benefits of migrating from VMware to AWS, including cost savings, cloud-native capabilities, and continuous innovation. Read on now to explore the why, how, and what of a successful VMware migration.

  • Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.

  • Computer Weekly – 15 October 2019: Securing the internet of things

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.

  • A Computer Weekly buyer's guide to Business Intelligence and Analytics

    Sponsored by: TechTarget ComputerWeekly.com

    Business intelligence and analytics is an ever-changing landscape. In this 20-page buyer's guide, Computer Weekly looks at firms' search for data scientists, how modern business intelligence works for big data and the role DevOps can play in navigating a data onslaught.

  • A Computer Weekly e-Guide to IAM

    Sponsored by: TechTarget ComputerWeekly.com

    We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.