ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"

  • Computer Weekly – 28 February 2017: Navigating software licences

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after SAP won a court case against a major customer, Diageo, over software charges, we look at what this means for users. We talk to the IT consultancy that recruits only autistic IT professionals. And we look at the CIO's big challenges for the year. Read the issue now..

  • Essential Guide: How APAC firms can ride out the pandemic

    Sponsored by: TechTarget ComputerWeekly.com

    In this Essential Guide, we examine the impact of Covid-19 on Asia-Pacific businesses, and how they have responded from a technology perspective by driving initiatives spanning digital transformation, business continuity, cloud, cyber security and remote working.

  • Mix and match:Overcoming cloud integration challenges

    Sponsored by: TechTarget ComputerWeekly.com

    This 33-page EGuide seeks to shine a light on all various forms of cloud integration challenges, alongside some of the approaches enterprises have taken to addressing them.

  • Mix and match: Overcoming cloud integration challenges

    Sponsored by: TechTarget ComputerWeekly.com

    This 33-page EGuide seeks to shine a light on all various forms of cloud integration challenges, alongside some of the approaches enterprises have taken to addressing them.

  • Computer Weekly – 16 August 2016: Barriers to UK datacentre expansion

    Sponsored by: TechTarget ComputerWeekly.com

    A TechUK survey has found that the UK tech sector's confidence of growth over the next two years has dropped by 23 points, due to Brexit. In this week's issue, we look at how Asian investors are pulling out of datacentre investments. According to datacentre analyst Broadgroup, these investors have been quite spooked by the Brexit vote.

  • Computer Weekly - 29 October 2019: IR35 reforms - the difficult decisions facing IT contractors

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.

  • The Spreadsheet User’s Guide to Modern Analytics

    Sponsored by: Alteryx

    If you're working in spreadsheets to do analysis, 90% of your workday is taken up by menial tasks you'd rather not be doing. Formatting data sources. Cleaning and parsing. Applying formulas.

  • Data classification tools: What they do and who makes them

    Sponsored by: TechTarget ComputerWeekly.com

    Data classification is an essential pre-requisite to data protection, security and compliance. Firms need to know where their data is and the types of data they hold. In this article, learn more about how these tools can help keep your data tidy and which suppliers offer the best options in the market.

  • 2024 Talkdesk global contact center KPI benchmarking report

    Sponsored by: Talkdesk

    Today’s organizations are constantly looking for new ways that they can enhance their contact center processes in order to make operations more efficient. To do so, many have turned to generative AI and other automation tools. However, does this technology actually live up to the hype? Dig into this report.

  • In data privacy we trust: building a strong information protection strategy in the hybrid era

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.