Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"
-
Computer Weekly – 19 June 2018: Microsoft becomes devoted to open source developers
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, after Microsoft's recent acquisition of GitHub, we examine the software giant's tools for embracing open source developers. Also, secretary of state for digital, culture, media and sport Matt Hancock talks about growing the UK digital economy and supporting the tech sector. Read the issue now.
-
Computer Weekly - 29 June 2021: Is the UK government planning to rewrite GDPR?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, a government taskforce on post-Brexit regulations has recommended changes to GDPR in the UK – we examine the implications. The NHS has launched a new data strategy - we look at what it means for your medical records. And we ask how to avoid the performance problems that affect private cloud. Read the issue now.
-
Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
-
Benefits of shifting from traditional to condition-based maintenance in electrical distribution equipment
Sponsored by: Schneider ElectricExplore in this white paper the power of condition-based maintenance and how it addresses modern electrical infrastructure reliability and availability requirements.
-
CW Middle East - October-December 2020: Egypt's datacentre plans take a step forward
Sponsored by: TechTarget ComputerWeekly.comWhile it builds an IT services industry, Egypt is also investing in infrastructure and now plans to develop a datacentre industry. Read in this issue how, as part of this plan, Egypt's parliament has passed a data protection law.
-
Eggplant Helps the Mauritius Commercial Bank Increase Testing Efficiency
Sponsored by: KeysightMauritius Commercial Bank used Eggplant to automate 70% of its regression testing, cutting upgrade time from 400 to 120 work days. This case study details how Eggplant helped MCB achieve full end-to-end testing and save 1,480 work days. Read the full case study to learn more.
-
Computer Weekly – 21 June 2022: Dreams come true – how data and communication saved a failing company
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the former CEO of bed retailer Dreams explains how digital, data and communication helped turn round a failing company. The UK government has a new digital strategy – but it all seems rather familiar. And we talk to the tech firms trialling a four-day working week. Read the issue now.
-
IT Project: Migration to cloud
Sponsored by: TechTarget ComputerWeekly.comThe benefits of using cloud are well-known, but the challenges and barriers enterprises come up against during their move off-premise can be wide, varied and unexpected. Knowing how best to negotiate these issues can help speed up the process of shifting workloads and applications to the cloud immeasurably.
-
A Computer Weekly buyer's guide to customer and employee experience management
Sponsored by: TechTarget ComputerWeekly.comBusinesses are facing new challenges to meet the expectations of customers and employees. In this 14-page buyer's guide, Computer Weekly looks at the benefits of the experience economy, the customer service implications of always-on mobile users and how digital platforms can engage customers across all channels.
-
Decentralising datacentres: The new challenges of security at the edge
Sponsored by: TechTarget ComputerWeekly.comIn September 2020, the Computer Weekly Security Think Tank, our panel of information and cyber security experts, consideredthe challenges inherent in decentralising the datacentre, and set out to answer the question, how can security professionals ensure such setups are just as secure as the traditional centralised model? Read more in this e-guide.