All resources sponsored by:

ComputerWeekly.com

1 - 25 of 916 Matches
Participate in our Customer Experience and Customer Relationship Management Research Program!
sponsored by ComputerWeekly.com
RESOURCE:Access your copy of Improving the Customer Experience Through Technology to get an inside look at what CRM professionals are doing to maintain a single view of a customer's history and contact information & the importance of offering multiple communication points. Simply take our CEM & CRM survey to access your complimentary guide.
Posted: 29 Jul 2014 | Published: 29 Jul 2014
Get This Now


Under-represented and Undervalued
sponsored by ComputerWeekly.com
PRESENTATION:In this presentation from Computer Weekly's Women in IT event, Gillian Arnold talks about the current skills crisis in the technology industry, and recruiting skills for a more diverse base into enterprises.
Posted: 29 Jul 2014 | Published: 29 Jul 2014
Get This Now


Computer Weekly – 29 July 2014: Going mobile in financial services
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, in a highly-regulated sector such as financial services, enabling staff mobility is a challenge – we hear from IT leaders that have made it work. We ask why small businesses are so poorly prepared for cyber attacks. And we examine the key storage technologies in the Openstack cloud platform. Read the issue now.
Posted: 28 Jul 2014 | Published: 28 Jul 2014
Get This Now


Application data security risks on Android devices
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Security Series argues that personal and sensitive application data stored on smartphones is not as secure as people think and looks at controls that can reduce the risk.
Posted: 23 Jul 2014 | Published: 23 Jul 2014
Get This Now


Security issues in Vanets
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Security Series analyses the security risks of Vehicular ad-hoc networks (Vanets), an important component of intelligent transportation systems.
Posted: 23 Jul 2014 | Published: 23 Jul 2014
Get This Now


Memory corruption attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Posted: 22 Jul 2014 | Published: 22 Jul 2014
Get This Now


Sharing knowledge to tackle online banking fraud
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.
Posted: 22 Jul 2014 | Published: 22 Jul 2014
Get This Now


Tactics to combat insider threat
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: 22 Jul 2014 | Published: 22 Jul 2014
Get This Now


Integrated Talent Management
sponsored by ComputerWeekly.com
ANALYST REPORT:This Independent analyst perspective into the integrated talent management systems market from Elearnity assesses the leading talent management suppliers.
Posted: 22 Jul 2014 | Published: 22 Jul 2014
Get This Now


Kicking off an e-health revolution
sponsored by ComputerWeekly.com
EGUIDE:It has been hailed as the next big thing for many years but, it is fair to say, e-health has failed to fulfill its potential. Issues around cost, ease of use and privacy have held back its adoption. Now, find out how Telefonica hopes to kick start the e-health revolution.
Posted: 21 Jul 2014 | Published: 21 Jul 2014
Get This Now


Computer Weekly – 22 July 2014: Time to get serious about endpoint security
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, with billions of devices joining corporate networks every year, our latest buyer's guide looks at endpoint security. IBM and Apple have announced plans to work together on corporate mobility – we analyse what the deal means for IT leaders. And we take an in-depth look at in-memory databases. Read the issue now.
Posted: 21 Jul 2014 | Published: 21 Jul 2014
Get This Now


Computer Weekly – 15 July 2014: Time for an upgrade? Why you should buy IT now
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, as competitive pressures and new technologies drive down IT prices, we find out why now is a great time to buy IT. We examine why going digital means a different approach to IT management. And we hear the latest best practices for improving your customer engagement with IT. Read the issue now.
Posted: 14 Jul 2014 | Published: 14 Jul 2014
Get This Now


CW500 IN THE CITY - Jason Scott-Taggart
sponsored by ComputerWeekly.com
PRESENTATION:Jason Scott-Taggart, head of IT service management at Worldpay looks at how Barclays met the challenge of implementing technologies to support mobility and flexible working.
Posted: 08 Jul 2014 | Published: 08 Jul 2014
Get This Now


Musings on data centres – volume 2
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:Analyst Clive Longbottom discusses the key issues in managing and designing datacentres, in this series of 12 articles.
Posted: 08 Jul 2014 | Published: 08 Jul 2014
Get This Now


Computer Weekly – 8 July 2014: The most influential women in UK IT
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, we reveal our annual list of the 25 most influential women in UK IT – female IT leaders making a difference to the digital economy. We look at how to integrate iPads into the corporate IT infrastructure. And we profile enterprise software upstart Workday as it challenges Oracle and SAP. Read the issue now.
Posted: 07 Jul 2014 | Published: 07 Jul 2014
Get This Now


Making the case for the cloud in common use airport technology
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This report from Amadeus looks at the business case for cloud computing in airports.
Posted: 04 Jul 2014 | Published: 04 Jul 2014
Get This Now


Women in Technology 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT:Are women flourishing in IT ? Find out by downloading the Women in techology report from Computer Weekly and Mortimer Spinks.
Posted: 04 Jul 2014 | Published: 04 Jul 2014
Get This Now


Recommendations on rolling back government surveillance
sponsored by ComputerWeekly.com
EBRIEF:Four former seniors staff from the US electronic intelligence gathering agency, the NSA, put the case for reform.
Posted: 01 Jul 2014 | Published: 01 Jul 2014
Get This Now


NSA insiders reveal what went wrong
sponsored by ComputerWeekly.com
EBRIEF:Former NSA employees explain how the agency missed vital intelligence on 9/11, broke the US constitution through mass surveillance against US citizens, and wasted billions of dollars on technology.
Posted: 30 Jun 2014 | Published: 30 Jun 2014
Get This Now


Computer Weekly – 1 July 2014: Supporting Apple in the enterprise
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, our latest buyer's guide takes an in-depth look at how to support Apple products in an enterprise IT infrastructure. We find out how eBay built its own Openstack private cloud. And the chief of the government's G-Cloud programme talks about changing public sector IT procurement. Read the issue now.
Posted: 30 Jun 2014 | Published: 30 Jun 2014
Get This Now


CW Europe – July 2014 Edition
sponsored by ComputerWeekly.com
EZINE:Lowering carbon emissions with storage - Is Europe considered green yet? CW Europe's storage editor investigates how changing your storage can make a world of a difference to your company's carbon emissions.
Posted: 27 Jun 2014 | Published: 26 Jun 2014
Get This Now


Computer Weekly – 24 June 2014: Betting on World Cup success
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, we talk to gambling site Betfair about the IT challenges of preparing for the football World Cup. We examine the strategy of cloud software pioneer Salesforce.com as it grows its role in the IT department. And we explain erasure coding – an emerging method for protecting storage hardware. Read the issue now.
Posted: 23 Jun 2014 | Published: 23 Jun 2014
Get This Now


Code Halos – How the digital lives of People, Things, and Organisations are Changing the Rules of Business
sponsored by ComputerWeekly.com
BOOK:This book extract explains how businesses can harness the power of Code Halo's - the data that accumulates around people, devices, and organizations.
Posted: 16 Jun 2014 | Published: 16 Jun 2014
Get This Now


Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014
Get This Now


Russia's answer to Silicon Valley
sponsored by ComputerWeekly.com
EGUIDE:The Russian government is investing in an ambitious project to create its own technology hub that they hope will go on to rival Silicon Valley. The billions of rubles of government money being invested on the outskirts of Moscow has the backing of several multinational technology companies IBM, SAP, Intel, Cisco and Siemens.
Posted: 22 Jul 2014 | Published: 22 Jul 2014
Get This Now


1 - 25 of 916 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement