ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"

  • Analyst Infographic: Before & After Impact

    Sponsored by: GoTo

    LogMeIn Rescue, a secure, enterprise-grade remote support solution, touts the business value it offers to its adoptees. But what’s the actual financial benefit customers have achieved? GoTo commissioned Forrester Consulting to conduct a Total Economic Impact study to find out. Check out this infographic to see the results.

  • The Ultimate Guide to Cyber Hygiene

    Sponsored by: Tanium

    It’s critical for organizations to deeply understand their risk posture and have tools in place that provide the endpoint visibility and control needed to detect and remediate security breaches. This white paper provides the benchmarks and security strategies that set IT teams up for success in proactively planning defenses against cyber threats.

  • Red Hat Ansible Automation Platform A beginners guide

    Sponsored by: Red Hat

    80% of organizations say that adopting IT automation is “extremely important” to the future success of their organization, according to Harvard Business Review. This white paper serves as a guide for the Red Hat Ansible Automation Platform. Dive into the guide today.

  • Intent-Guided Multithreading Tactics That Work

    Sponsored by: TechTarget

    As buyers become more digital, sellers must evolve their tactics. This white paper explores using intent-guided multithreading to identify and engage buying teams earlier, accelerate opportunities, and deliver high-value meetings that drive pipeline. Read the full white paper to learn more.

  • Fraud management: A perennial business issue

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.

  • Top 10 business applications stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    The steady incursion of artificial intelligence (AI) into enterprise software was a major theme behind Computer Weekly's indepth stories in this area in 2019. Human versus machine is the opposition that looms over much of the coverage here. Here are Computer Weekly's top 10 business applications stories of 2019.

  • Using Data to Get B2B Sellers Back on Track

    Sponsored by: TechTarget

    Many sellers have struggled to pivot their tactics to address changes in how buyers are doing business. Tap into this infographic to gain insights from recent survey results from TechTarget’s enterprise technology customers to learn where B2B sellers are struggling and how data can help them overcome challenges in engaging and converting buyers.

  • Explore the CMS interoperability and prior authorization rule

    Sponsored by: ZeOmega

    The CMS Interoperability and Prior Authorization final rule is here, with new requirements for Medicare Advantage, Medicaid, and CHIP plans. Learn how ZeOmega's HealthUnity platform can help you comply and streamline payer-provider collaboration. Read the full details.

  • Computer Weekly – 19 March 2019: How IT leaders should work with marketing

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, experts advise on how IT and marketing chiefs can work together to deliver a high-quality customer experience. We examine how supercomputers are transforming science by processing large-scale data analytics. And we look at a key ethical aspect of AI – how to explain the decisions an AI makes. Read the issue now.

  • Computer Weekly – 6 March 2018: Getting up to speed with 5G

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at what needs to be done to make next-generation 5G mobile networks a reality. Fewer EU workers are moving to the UK – we examine what that means for the IT skills gap. And we analyse the state of the hyper-converged infrastructure market. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.