All resources sponsored by:

ComputerWeekly.com

1 - 25 of 1131 Matches
Computer Weekly – 31 March 2015: What went wrong with the IT for farmers' rural payments?
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, we examine the real reasons behind the failure of the government's rural payments digital service. We look at how Windows 10 Universal Apps will change the way IT teams manage PCs. And we hear from IT leaders about their experiences of bringing cloud computing into the mainstream. Read the issue now.
Posted: 27 Mar 2015 | Published: 27 Mar 2015
Get This Now


Staying the course as a CIO
sponsored by ComputerWeekly.com
BOOK:In this extract from his book, Staying the Course as a CIO, Jonathan M. Mitchell looks at the challenges of managing IT projects.
Posted: 27 Mar 2015 | Published: 27 Mar 2015
Get This Now


Computer Weekly buyer's guide to data science
sponsored by ComputerWeekly.com
EBOOK:In this 10-page buyer's guide, Computer Weekly looks at how, with the open data movement taking hold and data analytics technology becoming increasingly sophisticated, data science is finding its use in a variety of fields.
Posted: 26 Mar 2015 | Published: 26 Mar 2015
Get This Now


Computer Weekly – 24 March 2015: Government backs tech in 2015 Budget
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, chancellor George Osborne's 2015 Budget was the most technology friendly ever – we examine the key policy announcements. Sainsbury's CIO talks about the challenges of going digital. And we look at how virtual reality could be coming to a workplace near you, thanks to the latest developments. Read the issue now.
Posted: 23 Mar 2015 | Published: 20 Mar 2015
Get This Now


Cloud options investigated
sponsored by ComputerWeekly.com
PRESENTATION:Arriva interim head of IT readiness Stuart Curley offers some tips on procuring cloud services in this PowerPoint presentation for Computer Weekly's CW500 club for senior IT leaders.
Posted: 17 Mar 2015 | Published: 17 Mar 2015
Get This Now


Tech Trends 2015
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:Deloitte's sixth Annual Tech Trends Report reveals the top macro technology developments that will disrupt businesses in the next 18-24 months.
Posted: 16 Mar 2015 | Published: 16 Mar 2015
Get This Now


Big & Fast Data: The rise of insight-driven business
sponsored by ComputerWeekly.com
RESEARCH CONTENT:This report from Capgemini and EMC, which surveyed more than 1,000 C-suite and senior decision makers around the world, looks at enterprise readiness for big data.
Posted: 16 Mar 2015 | Published: 16 Mar 2015
Get This Now


Computer Weekly – 17 March 2015: Smartwatches mean business
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, we examine the potential enterprise uses of the Apple Watch, and find out what sort of apps might work for businesses. Our latest buyer's guide discusses the future of the desktop computer. And we look at how technology is being used to improve customer experience for big consumer-facing organisations.
Posted: 13 Mar 2015 | Published: 13 Mar 2015
Get This Now


Information security in the retail chain
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series looks at how automated distribution centres play a business-critical role in the retail supply chain, and any challenge to their continuous availability and the services they provide must be overcome.
Posted: 12 Mar 2015 | Published: 12 Mar 2015
Get This Now


Mitigating the cyber threat from malicious insiders
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series provides an examination of a malicious insider attack as a sequence of phases and a practical 10-step programme for mitigating the threat.
Posted: 12 Mar 2015 | Published: 12 Mar 2015
Get This Now


Trends in packing and obfuscation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series looks at how two modern malware methods fit into today's landscape of advanced persistent threat and cyber crime as a service, and what the security industry can do to defend against them.
Posted: 12 Mar 2015 | Published: 12 Mar 2015
Get This Now


Building trust in the security of RFID systems
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series looks at the growing need for automated tools to verify protocols and address concerns over security and privacy.
Posted: 12 Mar 2015 | Published: 12 Mar 2015
Get This Now

TOPICS:  RFID | Security

Verifying the integrity of open source Android apps
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series looks at how researchers can determine whether an app was built from its published source code.
Posted: 12 Mar 2015 | Published: 12 Mar 2015
Get This Now


Business risks of software vulnerabilities
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series looks at how four sources of risk are relevant for evaluating the influence of software vulnerabilities on businesses.
Posted: 12 Mar 2015 | Published: 12 Mar 2015
Get This Now


Clustering to counter Android malware
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series looks at how the rapid growth of new Android malware calls for automated tools to help malware analysts.
Posted: 11 Mar 2015 | Published: 11 Mar 2015
Get This Now


Combating Android app repackaging attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series looks at how apps repackaged through reverse engineering pose a big security risk to the Android smartphone operating system.
Posted: 11 Mar 2015 | Published: 11 Mar 2015
Get This Now


Mac OS X persistent evidences for forensic purposes
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series provides a technical explanation of how Mac OS X persistence evidences can be extracted for forensic investigation.
Posted: 11 Mar 2015 | Published: 11 Mar 2015
Get This Now


Symbolic adversary modelling in smart transport ticketing
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series looks at possible extensions of a process algebra language used to support modelling of smart transport ticketing systems.
Posted: 11 Mar 2015 | Published: 11 Mar 2015
Get This Now


Authenticating taxicab services
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series looks at an authentication scheme for taxicabs to ensure passengers travel in safety.
Posted: 11 Mar 2015 | Published: 11 Mar 2015
Get This Now


Limiting malware propagation – a way forward
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series puts forward a suggestion for the creation and implementation of a hypervisor at a layer below the operating system.
Posted: 11 Mar 2015 | Published: 11 Mar 2015
Get This Now


Inside the mind of IT professionals
sponsored by ComputerWeekly.com
RESEARCH CONTENT:This unique study by the Psychological Consultancy shows the unique personality traits of IT professionals, and what drives them compared to professionals in a range of other industries.
Posted: 10 Mar 2015 | Published: 10 Mar 2015
Get This Now


Tech Insights: The UK Digital Economy
sponsored by ComputerWeekly.com
RESEARCH CONTENT:The number of tech enterprises in the UK grew by 8% in the past 12 months, double the rate of industry as a whole, contributing more than £90bn to the UK economy, according to this report by the Tech Partnership.
Posted: 10 Mar 2015 | Published: 10 Mar 2015
Get This Now


UK tech sector outperformed wider UK economy in Q4 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT:The UK tech sector enjoyed robust growth in the last quarter of 2014, avoiding the slowdown seen across the wider UK economy, according to this analysis by KPMG/Markit Tech Monitor.
Posted: 10 Mar 2015 | Published: 10 Mar 2015
Get This Now

TOPICS:  Careers | IT Workforce

Computer Weekly – 10 March 2015: A world of mobile possibilities
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, we report from Mobile World Congress, the world's biggest mobility event, on the latest innovations in mobile technology. Is the outsourcing industry set to cut thousands of jobs because of increasing IT automation? And we take an in-depth look at Google Container Engine. Read the issue now.
Posted: 06 Mar 2015 | Published: 06 Mar 2015
Get This Now


A Computer Weekly buyer's guide to desktop computing 2020
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:Tablets, smartphones, cloud computing and applications delivered as a service offer compelling new ways to work. In this 11-page buyer's guide, Computer Weekly looks at how this way of working is likely to evolve further over the next five years and how it will affect users and IT departments alike.
Posted: 05 Mar 2015 | Published: 05 Mar 2015
Get This Now


1 - 25 of 1131 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement