ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"

  • 6 Insights On Healthcare Consumer Preferences

    Sponsored by: The Advisory Board

    Healthcare consumers weigh several priorities, including access, convenience, cost, quality, and experience, when deciding where — or if — to seek care. As care providers compete on these priorities, view this report for a snapshot of the status quo from which they'll need to differentiate themselves.

  • CW APAC: Expert Advice on data management

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how companies and data management experts are tackling data challenges, and finds out how organisations are augmenting data management through artificial intelligence and machine learning.

  • The Definitive Guide to AI Platforms for Open-Source Data Science and ML

    Sponsored by: Anaconda

    This comprehensive white paper explores top open-source AI tools and use cases across industries. Inside, you'll learn how to empower your teams to build, deploy, and maintain secure AI solutions. Download now to discover strategic approaches to leverage AI for competitive advantage.

  • Asynchronous Telemedicine Guide + COVID-19: The Largest Case Study on Async

    Sponsored by: Fabric Health

    Discover the power of asynchronous care, the most efficient care delivery method. Based on over 15 years of experience in async, this comprehensive 29-page resource includes everything you need to know to implement an effective virtual-first strategy that enhances provider capacity, expands patient access, and offers a consumer-grade experience.

  • CW Nordics - November 2020-January 2021: Bank branch closures continue as digital banking grows

    Sponsored by: TechTarget ComputerWeekly.com

    Sweden's Handelsbanken is cutting its branch network by nearly half, which means more money will be invested in IT. But it's not just Sweden and the Nordics – banks across the world are watching the fintech industry demonstrate to consumers what banking can be like if the right technology is in place.

  • A Computer Weekly buyer's guide to cyber insurance

    Sponsored by: TechTarget ComputerWeekly.com

    In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.

  • Alchera, an AI Image Recognition Company, Improves Profits with License Management Solution Sentinel

    Sponsored by: Thales

    Alchera, a leading AI image recognition company, has developed cutting-edge technology with 99.99% accuracy. Its solutions are used in various industries, from finance to security. Learn how Alchera's flexible license management with Thales Sentinel helps expand its global reach and customer satisfaction. Read the full content for more details.

  • CW EMEA July 2023: Can we trust AI?

    Sponsored by: TechTarget ComputerWeekly.com

    Artificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public.

  • Computer Weekly – 30 April 2024: What's it like being the IT chief at Man Utd?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we speak to the chief digital information officer of Manchester United Football Club to discuss the IT that keeps a premiership team running. We also investigate how well prepared the UK is for major semiconductor supply chain disruptions. Read the issue now.

  • Addressing Zero Trust for Government: The Role of Identity Security

    Sponsored by: Merlin International

    As governments adopt Zero Trust, identity security is critical. This white paper explores the role of identity security in a Zero Trust architecture, including five key principles and six focus areas to get started. Learn how the CyberArk Identity Security Platform can help you implement a successful Zero Trust strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.