ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"

  • The next step for your legacy workloads is AWS

    Sponsored by: Virtusa

    Organizations across every industry want to become more agile so they can innovate and respond to changes faster. For many organizations, modernizing enterprise workloads is the best first step toward digital transformation. Read this eBook to learn about why organizations choose to migrate to AWS and how they modernize specific workloads.

  • Well-Planned Desktop Auditing: Avoid Issues and Tackle Windows Configuration

    Sponsored by: Dell Software

    This expert e-guide highlights the importance of well-planned desktop auditing and several key considerations to keep in mind to maximize the effectiveness of your next desktop audit. Access now and you'll also learn what's causing some IT professionals to resort to lying to get their audits passed.

  • New tech on the block: Planning for blockchain in the retail and consumer packaged goods industries

    Sponsored by: TechTarget ComputerWeekly.com

    This research from Deloitte identifies the areas with the biggest immediate opportunity for retail and consumer packaged goods (CPG) businesses looking to invest in blockchain technology.

  • Supply chain management balance shifts from efficiency to resilience under Covid

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide explores these matters, beginning with a comprehensive article that ranges over supply chain management, from a macro level through how trading platforms have been flexed to switch suppliers rapidly down to how robots have been quickly deployed to solve problems of scale.

  • Computer Weekly - 9 November 2021: How a cloud-first strategy helped save animals in the pandemic

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the RSPCA about how its cloud-first strategy helped to save animals throughout the pandemic. Data warehouses have been part of the IT landscape for 30 years – but are they now old technology, and what's next? And we assess how Brexit has affected risk and resilience in the datacentre. Read the issue now.

  • Top 10 IT security stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

  • Balancing innovation, safety, compliance, and risk in life sciences

    Sponsored by: XtelligentMedia Healthcare

    The life sciences sector is evolving rapidly, collaboration, compliance, and proactive risk management are key to patient safety.

  • CIO Trends #10: Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    Swedish people are pioneering when it comes to adopting the latest technologies. But this malleability to new tech has its limits. Read in this eguide how Swedish consumers are losing confidence in social media, with increasing distrust over personal data use and online privacy.

  • Building an AI strategy: Telcos put the foundations in place

    Sponsored by: AWS

    This report – based on interviews with 20 of the world’s largest and leading CSPs globally, plus a survey of 104 executives across 73 telcos worldwide – sets out to evaluate where operators are with their AI strategies and what they need to do to make them fit for the future and deployed at scale.

  • The Essential Guide To Growing Your Business With Managed Power Services

    Sponsored by: Schneider Electric

    This eBook from Schneider Electric guides IT solution providers on adding managed power services to increase revenue. Learn how to leverage software tools for remote monitoring and management of critical infrastructure. Read now to future-proof your business.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.