All resources sponsored by:

ComputerWeekly.com

1 - 25 of 1214 Matches
Reconsidering PKI and its Place in your Enterprise Encryption Strategy
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:Organisations need to re-think how to implement security across a range of devices, rather than settling for patchwork variations of PKI and commissioning deployments across the internet of things, this report from Omlis argues.
Posted: 03 Sep 2015 | Published: 03 Sep 2015
Get This Now


Business-driven application release automation
sponsored by ComputerWeekly.com
ANALYST REPORT:DevOps is growing in popularity, however organisations need well designed and implemented DevOps strategies if they are to benefit the business, say analysts Clive Longbottom and Bernt Ostergaard.
Posted: 03 Sep 2015 | Published: 03 Sep 2015
Get This Now


The secure use of cloud-based services
sponsored by ComputerWeekly.com
ANALYST REPORT:Attitudes to cloud-based services vary, but over time there has been increasing uptake as the benefits are recognised by more and more businesses. Those in the vanguard recognise that there is ground work to do; certain security measures must be put in place to enable safe use of cloud-based platforms and applications.
Posted: 03 Sep 2015 | Published: 03 Sep 2015
Get This Now


Evidence of the Effects of Healthcare IT on Healthcare Outcomes
sponsored by ComputerWeekly.com
RESEARCH CONTENT:This study by HIMSS Analytics highlights, for the first time, a correlation between the maturity of IT within NHS hospitals and improvements to patient outcomes.
Posted: 02 Sep 2015 | Published: 02 Sep 2015
Get This Now


Data Breach Readiness 2.0
sponsored by ComputerWeekly.com
RESEARCH CONTENT:Drawing on insights from more than 400 senior business executives, this research from Experian reveals that many businesses are ill-prepared for data breaches.
Posted: 01 Sep 2015 | Published: 01 Sep 2015
Get This Now


Weak links – Strengthening the information supply chain
sponsored by ComputerWeekly.com
ANALYST REPORT:Analysts Bob Tarzey and Rob Bamforth argues the case for a systematic approach to securing the information supply chain.
Posted: 01 Sep 2015 | Published: 01 Sep 2015
Get This Now


Computer Weekly – 1 September 2015: Wearable Technology Proves its Worth on the Front Line
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, we look at business applications for wearable technology. With hands-free police and military pilot projects already under way, wearable technology is set to make its mark in the enterprise in the near future.
Posted: 28 Aug 2015 | Published: 28 Aug 2015
Get This Now


Computer Weekly – 25 August 2015: Coping with a crisis
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, IT leaders discuss their experiences of dealing with disaster and the importance of planning to ensure business continuity. Jaeger's CIO talks about bring the iconic fashion brand into the digital age. And we look at the issues around writing supplier contracts for agile software development. Read the issue now.
Posted: 21 Aug 2015 | Published: 21 Aug 2015
Get This Now


A Computer Weekly buyer's guide to log management
sponsored by ComputerWeekly.com
EBOOK:In this 13-page buyer's guide, Computer Weekly looks at how companies analyse server and security logs to tackle cybercrime and internal fraud;how application log management provides insight into application behaviour, which can be used to build better software;and how network administrators can use data from log files to automate security systems.
Posted: 19 Aug 2015 | Published: 19 Aug 2015
Get This Now


CW Nordics – August 2015 Edition
sponsored by ComputerWeekly.com
EZINE:5G technology from Ericsson could soon be used to improve communication and remote control operations in the mines of Sweden. A project designed to improve productivity and safety in traditionally dangerous environments is being run by Ericsson, ABB, Boliden, SICS Swedish ICT and Volvo Construction Equipment.
Posted: 18 Aug 2015 | Published: 18 Aug 2015
Get This Now


Insider Threat Report 2015
sponsored by ComputerWeekly.com
RESEARCH CONTENT:This survey of 500 cyber security professionals offers insight into the state of insider threats and solutions to prevent them.
Posted: 18 Aug 2015 | Published: 18 Aug 2015
Get This Now


Beyond Nine to Five
sponsored by ComputerWeekly.com
BOOK:In this extract from his book, Ade McCormack offers guidance to enable you to move forward in your career with the minimum of anxiety as digital technology fundamentally changes the nature of work.
Posted: 17 Aug 2015 | Published: 17 Aug 2015
Get This Now


Computer Weekly – 18 August 2015: Will digital government remain on course?
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, the UK government's digital chief has announced his shock departure, but what will it mean for the future of digital public services? Dell went back to a private company two years ago – has it proved to be a successful move? And our latest buyer's guide looks at big data appliances. Read the issue now.
Posted: 14 Aug 2015 | Published: 14 Aug 2015
Get This Now


Sensible one page thoughts – Teamwork essentials
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:Ludo Houdenaert, an independent management consultant, has distilled more than 30 years of experience into a series of inspirational articles.
Posted: 13 Aug 2015 | Published: 13 Aug 2015
Get This Now


The BPO profession in 2015
sponsored by ComputerWeekly.com
ANALYST REPORT:Business process outsourcing (BPO) services are becoming a crucial element of a hybrid operating environment that frequently involves in-house shared services, offshore in-house centres, and other service provider delivery teams in adjacent areas, this analyst report from HfS Research reveals.
Posted: 13 Aug 2015 | Published: 13 Aug 2015
Get This Now


Workplace Technology Insight 2015
sponsored by ComputerWeekly.com
RESEARCH CONTENT:This research report from ADP looks at the lessons for multinational businesses as technology improves productivity of the workforce and changes the world of work.
Posted: 12 Aug 2015 | Published: 12 Aug 2015
Get This Now


Threat intelligence sharing and the government's role
sponsored by ComputerWeekly.com
RESEARCH CONTENT:This survey for Alien Vault paints a picture of how threat intelligence is obtained, utilised and shared, and seeks out views as to the role the government and law enforcement has to play to help better protect enterprises from threats.
Posted: 12 Aug 2015 | Published: 12 Aug 2015
Get This Now


Surviving the expenses nightmare
sponsored by ComputerWeekly.com
BOOK:This short paper will look at the top ten issues employees struggle with when it comes to that all important end of year final demand for expenses from the finance department, and explores how an on-line expenses management system could alleviate these issues.
Posted: 11 Aug 2015 | Published: 11 Aug 2015
Get This Now


Financing IT change
sponsored by ComputerWeekly.com
ANALYST REPORT:Companies that are embarking on big IT strategies have to seek out robust stable partners with the commitment to offer finance packages that will underpin and support the strategy to completion, argue analysts Rob Bamford and Clive Longbottom.
Posted: 11 Aug 2015 | Published: 11 Aug 2015
Get This Now


Getting to know you
sponsored by ComputerWeekly.com
ANALYST REPORT:The pressing need to effectively engage with outsiders has turned identity and access management (IAM) into a business priority, say analysts Bob Tarzey and Rob Bamford.
Posted: 10 Aug 2015 | Published: 10 Aug 2015
Get This Now


Computer Weekly – 11 August 2015: Data unlocks personalised customer service
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, we examine how companies are starting to use big data analytics to deliver more personalised customer services. We talk to the government's IT procurement chief about improving public sector tech purchasing. And Volvo's CIO tells us how connected cars will reshape the automotive sector. Read the issue now.
Posted: 07 Aug 2015 | Published: 07 Aug 2015
Get This Now


Computer Weekly – 4 August 2015: Cyber risks hit the road
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, after hackers took remote control of a Jeep Cherokee, we assess the security concerns for internet-connected cars. With the growth of digital banking, is there a need for high-street branches anymore? And we examine whether email overload is hindering the UK's economic productivity. Read the issue now.
Posted: 03 Aug 2015 | Published: 03 Aug 2015
Get This Now


CW Europe – August 2015
sponsored by ComputerWeekly.com
EZINE:This issue of CW Europe investigates the different cultural attitudes towards data management ethics.
Posted: 31 Jul 2015 | Published: 31 Jul 2015
Get This Now


CW Buyer's Guide: DevOps
sponsored by ComputerWeekly.com
EBOOK:Computer Weekly looks at how combining development and operations teams can cut time and raise quality; how DevOps done well can lead to a continuous loop where teams plan, code, build, test, release, deploy, operate and monitor – then repeat; and the steps the enterprise should take in adopting a DevOps approach.
Posted: 30 Jul 2015 | Published: 30 Jul 2015
Get This Now


Cloud Storage Research
sponsored by ComputerWeekly.com
RESOURCE:Some organisations may not want to deal with housing, running and maintaining an in-house cloud storage infrastructure. If this is the case, they can contract with a cloud storage service provider for the equipment used to support cloud operations. Take our short survey and share your thoughts.
Posted: 30 Jul 2015 | Published: 30 Jul 2015
Get This Now


1 - 25 of 1214 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement