ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"

  • 2024 Data Protection Trends Report

    Sponsored by: Veeam Software

    The global data protection market continues to grow. In this new research report, 1,200 business and IT leaders were surveyed on their IT and data protection strategies, including their plans for 2024 and beyond. Download the 2024 Data Protection Trends report to learn more.

  • Top 10 business applications stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    The steady modernisation of ERP systems, as they edge to the cloud and are complemented by new-generation customer software, was markedly evident this year. And blockchain and AI are making inroads. In this e-guide, Computer Weekly takes a look at the top 10 business applications of 2018.

  • One SOC to Rule Them All: SonicWall’s Managed Security Services

    Sponsored by: SonicWall

    Secure your entire attack surface with SonicWall's Managed Security Services. Get 24/7 SOC monitoring for endpoint, cloud, and network protection. Learn how to deliver superior security to your clients without breaking the bank - read the full white paper.

  • CIO Trends #8

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, take a look at some of our most popular articles on issues faced by IT decision makers, such as how to create a strategy that works for the business in a digital age and tips on how to take advantage of opportunities to lead your organization to unprecedented success.

  • Unleashing the power of the cloud: A guide to modernizing your SQL server and .NET Applications on AWS

    Sponsored by: AWS

    In this eBook you will discover how modernizing your Microsoft SQL Server and .NET applications on AWS unlocks benefits such as increased agility, reduced total cost of ownership, developer efficiency, ad improved return on investment.

  • Contact Center-as-a-Service MetriRank 2023

    Sponsored by: 8x8

    In this analyst report, discover how the top-ranking CCaaS solutions stack up against the competition, and find out which solution is best for your enterprise.

  • Computer Weekly – 12 June 2018: How National Geographic uses tech to captivate its audience

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the world-famous National Geographic magazine is adapting to the digital age and using technology to better engage its audience. We ask what Microsoft's $7.6bn acquisition of GitHub means for the open source community. And our latest buyer's guide looks at developer tools. Read the issue now.

  • A Deep Dive into Shadow IT: Examples, Risks, and Solutions

    Sponsored by: Auvik Networks, Inc.

    Shadow IT threatens data security and compliance. In this white paper, discover examples like unapproved comms tools or personal devices, and learn how to tackle shadow IT risks and solutions.

  • The state of application modernization 2024

    Sponsored by: Red Hat

    This in-depth e-book explores how organizations are approaching application modernization. Key findings include positive attitudes, continued progress, and the growing use of AI to support modernization efforts. Read on to learn more about the strategies and challenges companies are facing on their modernization journeys.

  • Remote Tech Talent Report

    Sponsored by: Remote

    While 58% of today’s companies report that they want to hire abroad to diversify their teams, only 36% are actually actively looking to global markets to hire tech talent. So, how can organizations more effectively look for talent across borders without increasing costs? Browse this guide to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.