ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"

  • How Do Vulnerabilities Get Into Software?

    Sponsored by: Veracode, Inc.

    Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.

  • Innovating with cloud-based electronic health records

    Sponsored by: Amazon Web Services

    Migrate your electronic health record to the cloud to transform care through faster innovation at scale.

  • Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.

  • AI: Beyond the hype

    Sponsored by: TechTarget ComputerWeekly.com

    Artificial Intelligence is red hot. But what lies beyond the hype? Once it was big data, then cloud, now it is artificial intelligence, and that sub-set of it which is machine learning, that's generating more heat than light. Is there business value here?

  • CW EMEA October 2024: Legally bionic

    Sponsored by: TechTarget ComputerWeekly.com

    In Sweden, the legal profession has begun a discussion around the use of artificial intelligence in the sector, in response to the increasing use of AI tools at law firms.

  • A Computer Weekly Buyers Guide to IoT

    Sponsored by: TechTarget ComputerWeekly.com

    In these uncertain times, making solid predictions for the year ahead looks like a definition of a mug's game. While this has been the fuel for the fire for the boom in applications such as video conferencing as used to support remote working, the same really can be said for the internet of things (IoT).

  • Computer Weekly - 2 February 2021: Business intelligence helps ambulance service's pandemic response

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how one ambulance service is using business intelligence tools to join up datasets to improve its response to the Covid-19 pandemic. Our latest buyer's guide examines video conferencing and collaboration. And we look at the benefits of real-time streaming data analytics. Read the issue now.

  • Computer Weekly – 24 July 2018: Building intelligent aircraft engines with AI and analytics

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to Rolls-Royce about using AI, sensors and data analytics to build intelligent aircraft engines. Our latest buyer's guide examines the next generation of desktop IT. And we ask whether a court ruling in Chile could lead to a worldwide change in Oracle's software licensing practices. Read the issue now.

  • Trends In Zero Trust Strategies And Practices Remain Fragmented, But Many Are Seeing Success

    Sponsored by: Portnox

    34% of organizations report having paused or abandoned a zero-trust project in the past, according to research by TechTarget’s Enterprise Strategy Group (ESG). To discover the drivers that informed that decision, and to explore other trends in zero trust, dig into this ESG research report.

  • Fintech : Meet ten financial services disruptors - Part Two

    Sponsored by: TechTarget ComputerWeekly.com

    Whether it's the insurance sector, lending or full service banking there are a number of companies, often still in their early stages, disrupting the financial services sector. But who are these companies, where do they come from, and what drives them? In this e-guide, the second in a series, we meet another ten of them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.