ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"

  • IT Priorities 2020: India

    Sponsored by: TechTarget ComputerWeekly.com

    As an IT powerhouse, India continues to be the pace setter for growth in Asia-Pacific's IT industry. In this guide to IT Priorities in 2020, find out what 243 Indian IT professionals revealed about their digital transformation efforts and key areas of spending for the coming year.

  • The Six Principles Of AI-Ready Data Establishing A Trusted Data Foundation For AI

    Sponsored by: Qlik

    In this white paper, you'll find out how to establish a trusted data foundation for AI with 6 key principles: data must be diverse, timely, accurate, secure, discoverable, and consumable by machine learning and large language models. Read on now to learn how you can unlock your organization's AI potential.

  • Dutch organisations demand more from government

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.

  • CIO Trends Q1 2016

    Sponsored by: TechTarget ComputerWeekly.com

    This guide offers a collection of our most popular articles for IT leaders during the first few months of 2016, examining the changing role of CIOs and how to enhance their relationships with their peers across the business.

  • Accelerating Cloud Migration for VMware Customers

    Sponsored by: Nutanix

    As VMware customers face uncertainty due to the Broadcom acquisition, many are accelerating cloud migration to mitigate risk and increase agility. This white paper explores challenges and solutions for lifting and shifting VMware workloads to the cloud with Nutanix. Read on now to learn how you can simplify your cloud migration.

  • Computer Weekly - 26 July 2022: Inside Russia's Ukraine information operations

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we get the inside track on Russia's disinformation operations attempting to spread propaganda and cyber threats about the invasion of Ukraine. Our new buyer's guide looks at customer and employee experience management. And we assess 10 top Kubernetes backup suppliers. Read the issue now.

  • A Computer Weekly Buyer's Guide: Office Productivity for Home Workers

    Sponsored by: TechTarget ComputerWeekly.com

    The question of productivity has become an inevitable consideration since the pandemic made home working commonplace. In this 16-page buyer's guide, Computer Weekly looks at how it's being maintained, the advantages a remote workforce brings to business and the hybrid model being embraced by workers.

  • Top 10 retail technology stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly looks at what 2019 had in store for the retail industry – what technologies were retailers rushing to adopt and how is customer behaviour changing?

  • Computer Weekly – 25 July 2017: How the DVLA is making driving digital

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we hear from the DVLA about how it is becoming a digital hub for motoring and moving away from its legacy IT. Our latest buyer's guide examines the future of data management. And we look at the importance of understanding the small print in your software licensing agreements. Read the issue now.

  • Chapter 1: Security and Risk Management

    Sponsored by: McGraw Hill

    In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.