ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"

  • CW APAC – Trend Watch: Datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    Sustainability targets are becoming more pertinent than ever. In this handbook, focused on datacentres in the Asia-Pacific region, Computer Weekly looks at how firms are approaching the topic, why STT GDC is building its largest datacentre in the Philippines, OVHCloud's India project and the impact of generative AI.

  • A Computer Weekly buyer's guide to datacentre cooling

    Sponsored by: TechTarget ComputerWeekly.com

    Effective cooling methods are essential for the running of the datacentre. In this 16-page buyer's guide, Computer Weekly looks at how to power them efficiently, the potential of a shift to liquid cooling systems and the most cost-effective methods of datacentre cooling.

  • CW Benelux - May-July 2021: Netherlands university launches centre of expertise in applied AI

    Sponsored by: TechTarget ComputerWeekly.com

    Amsterdam University of Applied Sciences has launched a centre of expertise in applied artificial intelligence, and students from all faculties of the university will learn how to apply AI in their field of study.

  • Domain Name System (DNS) Security

    Sponsored by: Cisco

    SRM leaders must fully understand the FedRAMP program, its security levels, and the authorization process to make informed cloud security decisions. Verify CSP FedRAMP status and ask probing questions. Remember that using a FedRAMP-authorized cloud does not absolve security responsibilities. Read the full Gartner Research Report to learn more.

  • How To Set Up An HR Function: The Essential Guide And Checklist

    Sponsored by: Sage

    This comprehensive guide walks through the essential steps to set up an effective HR function, from defining your business objectives to establishing policies and performance management. Download the e-book to learn how to build a people-focused strategy that supports your company's growth.

  • Prioritizing 5G for Healthcare SMBs

    Sponsored by: T-Mobile for Business

    One out of four healthcare SMBs said that 5G is a top 3 technology and health IT initiative that will impact healthcare over the next five years. Planning and investing in 5G will provide many benefits to the healthcare industry, but 5G comes with challenges that can be carefully navigated with the right partners.

  • Be The Match Saves More Lives With Better Data

    Sponsored by: Arrow NetApp

    Be The Match, a nonprofit helping patients get life-saving bone marrow transplants, accelerates donor-patient matches with NetApp storage infrastructure. Access this case study to learn how the nonprofit enabled more lives to be saved through improved data management and performance.

  • SD-WAN: Hitting the mainstream

    Sponsored by: TechTarget ComputerWeekly.com

    For the networking industry, 2018 was the year that interest in software-defined wide area network started to ramp up in earnest, as more enterprises started to assess the benefits of the technology, and more early adopters started to make concrete purchasing decisions. In this e-guide, our experts explore the state of play in the SD-WAN market.

  • Computer Weekly – 4 October 2016: How Microsoft aims to tackle information overload

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the firm wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer's guide looks at network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.

  • Computer Weekly – 28 March 2023: Is TikTok really a security threat to your business?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, with the UK government becoming the latest administration to ban TikTok, we ask whether the controversial social media app is really a security threat to enterprises. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.