ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"

  • Enhancing Healthcare Security: NIST Framework and Health Breach Notification Rule

    Sponsored by: XtelligentMedia Healthcare

    The collection of best practices and standards found in the NIST Cybersecurity Framework can help healthcare organizations improve their overall security postures.Vendors of personal health records, including health apps and other non-HIPAA-covered businesses, are subject to the Federal Trade Commission's Health Breach Notification Rule.

  • Transform your applications with Red Hat OpenShift Service on AWS

    Sponsored by: Red Hat

    Discover how to modernize your applications and IT operations with a hybrid cloud platform. Learn to rapidly build, deploy, and manage cloud-native apps across on-premises and cloud environments. Read the e-book to unlock new business possibilities.

  • Unleash the power of generative AI: build better applications, faster

    Sponsored by: AWS

    The eBook “Unleash the Power of Generative AI: Build Better Applications, Faster” describes how companies and their application developers can overcome the barriers to generative AI adoption by leveraging AWS tools and services.

  • A Computer Weekly buyer's guide to storage for the internet of things

    Sponsored by: TechTarget ComputerWeekly.com

    The internet of things is being used to improve storage options. In this 13-page buyer's guide, Computer Weekly looks at how the IoT could increase volumes of data, the challenges it may bring, and the role edge processing, analytics and the cloud has to play in increasing profits

  • Computer Weekly – 14 August 2018: Infrastructure under attack

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.

  • The Total Economic Impact™ Red Hat Enterprise Linux On Microsoft Azure

    Sponsored by: Red Hat

    Forrester Consulting's Total Economic Impact™ study shows Red Hat Enterprise Linux on Microsoft Azure delivers 192% ROI, $7.85M NPV, and a less than 6-month payback. Key benefits include improved business continuity, reduced data center costs, reallocated IT FTE time, and legacy solution consolidation. Download the full report to learn more.

  • Computer Weekly – 7 November 2017: The ethics of software development

    Sponsored by: TechTarget ComputerWeekly.com

    Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.

  • Hacking the Human Operating System

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

  • The Rise of Globally Distributed Teams

    Sponsored by: Remote

    Despite continued controversy over remote work, many teams are now looking to another slowly rising trend: distributed work. Organizations are now moving beyond international borders to improve costs, diversity, retention, and more to ensure productivity and employee satisfaction. Dig into this report to learn more.

  • CW Europe - June-August 2021: Amsterdam reins back datacentre developments over environmental concerns

    Sponsored by: TechTarget ComputerWeekly.com

    The construction of datacentres in the Netherlands' Amsterdam region has accelerated at such a pace that their demands for electricity are causing concern, prompting city authorities and datacentre operator to open a dialogue about sustainable datacentre industry expansion.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.