ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"

  • Best Practices In Cloud Spend Management

    Sponsored by: ServiceNow

    FinOps teams need to align tech efforts with budget limits. ServiceNow Cloud Cost Management offers a unified platform to monitor hybrid cloud expenses, budget effectively, optimize resources, and deactivate unused services. Discover how to enhance your cloud efficiency and expenditure by reading the full content.

  • Computer Weekly – 4 April 2023: Revitalising UK digital government

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the UK plummets down the international rankings for digital government, can its £400m identity system revitalise the UK's digital strategy? Read the issue now.

  • Computer Weekly - 20 April 2021: Shop and go – will Amazon's cashless 'just walk out' store work?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, Amazon has opened its first 'just walk out' grocery store in the UK, but is it the right time to hit the high street? We examine the human and technical issues around email security. And we analyse Microsoft's $19bn purchase of voice recognition supplier Nuance. Read the issue now.

  • Information Security and Compliance Future Trends 2024

    Sponsored by: Cloudflare

    Explore how regulation, sophisticated attacks, and AI will shape security spending in the near future. Learn about the latest trends in API security, data privacy, identity management, and more. Download this comprehensive analyst report to stay ahead of the evolving cybersecurity landscape.

  • July ezine: Getting storage right

    Sponsored by: MicroScope

    An issue looking at what products are in demand now in the storage world and what technologies are coming that need to be embraced by the channel.

  • Computer Weekly - 23 March 2021: Would the UK really nuke a cyber attacker?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, did the UK's defence and security review really suggest a nuclear response to a cyber attack? Data visualisation has been widely used to explain the Covid-19 pandemic, but not always that effectively. And jewellery retailer Pandora explains how it kept the personal touch as customers went online. Read the issue now.

  • Risk management is the beating heart of your cyber strategy

    Sponsored by: TechTarget ComputerWeekly.com

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.

  • How To Adopt Genai Today, And Revolutionize Your Tomorrow

    Sponsored by: Atos

    In this infographic, you'll learn to adopt Generative AI and transform your business. After reading, you will understand the three stages of GenAI adoption, from infrastructure to data expansion. Read on now to discover GenAI's power and find out how Atos and Microsoft can help prepare you to unlock its potential.

  • Computer Weekly – 5 June 2018: The bumpy ride to digital transformation

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the lessons to be learned from General Electric's bumpy ride to digital transformation. We assess the use of software-defined networking in corporate IT infrastructures. And we find out how Royal Bank of Scotland approaches digital and business innovation. Read the issue now.

  • Navigating the Evolving AI Infrastructure Landscape

    Sponsored by: Micro Strategies

    As AI adoption accelerates, organizations face challenges like skills gaps and high costs. Yet, many are deploying AI infrastructure across hybrid, cloud, and edge environments to enhance decision-making and competitiveness. Read this Enterprise Strategy Group research report to learn how companies are navigating the evolving AI landscape.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.