ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"

  • Cyber Help (And Hope) For K-12 Targets

    Sponsored by: SonicWall

    Because K–12 systems usually employ fewer cybersecurity experts than other industries, they are a prime target for cybercriminals. So, how can K–12 environments improve security? For guidance, check out this 8-page white paper.

  • Analyzing the Economic Benefits of Modernizing With AWS

    Sponsored by: AWS & Adastra

    Modernizing with AWS can increase business agility, enhance security, and improve financials. This economic analysis by Enterprise Strategy Group examines the benefits of AWS Modernization Pathways, including accelerated time to market, reduced costs, and improved insights. Read the full report to learn more.

  • Computer Weekly – 8 October 2024: Digital government on a budget

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how Labour's version of austerity will affect the government's desire for digital transformation. We find out how the use of AI in the workplace is negatively affecting low-income workers. And an SAP customer explains how it plans to keep running after the end of support for ECC. Read the issue now.

  • ITOps & service management: The state of play in APAC

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide on ITSM in APAC, find out how to keep IT operations running to empower a remote workforce, the advantages of cloud-based service management tools and how one Australian company is managing IT incidents amid a shorter development lifecycle.

  • CIO Trends #8

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, take a look at some of our most popular articles on issues faced by IT decision makers, such as how to create a strategy that works for the business in a digital age and tips on how to take advantage of opportunities to lead your organization to unprecedented success.

  • Your Guide To Adopting Genai: The Three Stages To Getting Data-Ready For Genai.

    Sponsored by: Atos

    In this white paper, you'll discover how to adopt generative AI (GenAI) and build a GenAI-ready hybrid/multi-cloud infrastructure with Atos and Microsoft. Read on to learn about the three stages to getting your data environment ready for GenAI.

  • How transport and logistics organisations can build agile and cyber resilient operations

    Sponsored by: Vodafone

    In this eBook, you’ll learn about what issues transport and logistics organizations are facing, key trends that are impacting the sector, and how technology can help these firms be better prepared to overcome the challenges of today and the future. Read the eBook here.

  • UK IT Priorities 2016

    Sponsored by: TechTarget ComputerWeekly.com

    Every year, Computer Weekly and TechTarget conduct a global survey of our readers to understand their technology spending priorities for the coming 12 months. Our research offers a unique insight into the purchasing decisions of IT decision-makers worldwide.

  • The Ultimate Guide to Selling Managed Network Services

    Sponsored by: Auvik Networks, Inc.

    From selecting prospects to closing deals, discover guidance for selling managed network services in this 17-page e-book.

  • Cyber security in the Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.