ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"

  • AI proves value in HR, but handle with care

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, discover how the allocation of work by algorithm might have advantages for workers as well as employers, how AI is proving its value for HR and how data analytics is being used to support expansion and development.

  • Computer Weekly – 30 August 2016: Get protected

    Sponsored by: TechTarget ComputerWeekly.com

    It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.

  • Computer Weekly – 14 November 2017: How fashion is turning to tech to get closer to customers

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how the fashion world and clothing retailers are using technology to better understand customers. Brexit continues to dominate conversation in the UK tech sector – we find out the hopes and fears of the industry. And we look at how to use OpenStack in a hyper-converged infrastructure. Read the issue now.

  • ServiceOps 2024: Automation and (gen)AI-powered IT service and operations

    Sponsored by: ServiceNow

    ServiceOps just makes sense. It is practical and makes everyone’s job easier… but how can you adopt without requiring major disruption in day-to-day realities? Find out in this research report.

  • Computer Weekly - 3 March 2020: What will points-based immigration mean for IT recruitment?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the government's new points-based immigration rules and assess the implications for the tech sector. IR35 tax rules change in April – we find out how IT contractors need to prepare. And we examine whether the rise of cloud is really displacing the datacentre. Read the issue now.

  • Survey Report: AI, Today

    Sponsored by: Dataiku

    As GenAI becomes a cornerstone of modern business, 90% of leaders are making substantial investments to harness its potential. Of those, 33% have created new budget lines specifically for GenAI, while 57% are using money from other budgets, such as IT, data science, or analytics. Access this research content now to learn more.

  • 4 IT Automation Myths Dispelled

    Sponsored by: Red Hat

    Read this e-book to learn how to overcome practical barriers to holistic automation adoption within your organization. Coverage includes automation goal setting, common myths, how to unite teams and training, and scaling automation across the business.

  • The DevSecOps Playbook

    Sponsored by: Veracode

    This e-book offers a practical guide on implementing DevSecOps to integrate security into the software development lifecycle. Dig into the guide to learn how to establish a common security language, onboard applications with automated scans, define security policies, triage findings, and prevent flaws.

  • The DevSecOps Playbook Practical Steps for Producing Secure Software

    Sponsored by: Veracode, Inc.

    What are practical steps for adopting DevSecOps? Find out in this 20-page e-book, which maps out how to build a modern software development workflow around security.

  • Evaluating the Pillars of Responsible AI

    Sponsored by: Hitachi Pentaho

    As AI's role expands, responsible AI practices become increasingly crucial. This Enterprise Strategy Group research report covers key pillars like bias, fairness, and transparency, and how to align innovation with ethical AI development. Read on now to learn how you can build an effective, responsible AI strategy for your organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.