All resources sponsored by:

ComputerWeekly.com

1 - 25 of 932 Matches
The Digital Value Proposition and securing CEO buy-in
sponsored by ComputerWeekly.com
PRESENTATION:Every business should be a digital business, says Stephen Paterson, Chief Product Officer at ANDigital in this presentation.
Posted: 27 Aug 2014 | Published: 27 Aug 2014
Get This Now


Social Media: IT Purchasers get social, marketers play catch up ?
sponsored by ComputerWeekly.com
RESEARCH CONTENT:IT decision makers are using social media effectively at work, but marketers are playing catch up, according to this research snapshot.
Posted: 26 Aug 2014 | Published: 26 Aug 2014
Get This Now


Computer Weekly – 26 August 2014: Can national security and privacy co-exist?
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, we talk to NSA whistleblower Bill Binney about the often-conflicting needs of security and privacy. We find out how Google is using artificial intelligence to improve datacentre energy efficiency. And we look at a project to use wearable technology and big data to help tackle Parkinson's disease. Read the issue now.
Posted: 26 Aug 2014 | Published: 22 Aug 2014
Get This Now


Harnessing Business-Led IT
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:CIOs should treat business-led IT ("Shadow IT") as another, often better, way to achieve the core goals of Corporate IT, this report from CEB argues
Posted: 22 Aug 2014 | Published: 22 Aug 2014
Get This Now


RSA's Digital Journey
sponsored by ComputerWeekly.com
PRESENTATION:Ian Hood, Group Digital Director of RSA, tells the story of one of the UK's largest insurers journey to digital technology in this presentation.
Posted: 22 Aug 2014 | Published: 22 Aug 2014
Get This Now


CW Buyer's Guide to Business Process Automation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:Computer Weekly looks at how to facilitate and manage the growing role of workload automation in the enterprise in this 10-page buyer's guide.
Posted: 22 Aug 2014 | Published: 22 Aug 2014
Get This Now


Research snapshot – BYOD in the UK
sponsored by ComputerWeekly.com
EBRIEF:BYOD is fast becoming a normal part of daily business life in the UK, this snapshot survey of 100 UK businesses by Vanson Bourne reveals.
Posted: 15 Aug 2014 | Published: 15 Aug 2014
Get This Now


Build for Change – the Risk of Customerpocalypse
sponsored by ComputerWeekly.com
BOOK:The enterprise must focus on how it engages customers and responds to their expectations, or face Customerpocalypse, writes Alan Trefler, in this extract from his book Build for Change.
Posted: 15 Aug 2014 | Published: 15 Aug 2014
Get This Now


Computer Weekly – 19 Aug 2014: Training school leavers could help organisations develop the IT skills they require and fill the growing skills gap
sponsored by ComputerWeekly.com
EZINE:While the latest GCE A-Level results suggest that more people than ever will go on to study science, technology, engineering and maths (Stem) courses at university, the IT industry is failing to attract enough new talent. An ageing workforce means there is a "demographic time bomb in IT".
Posted: 15 Aug 2014 | Published: 15 Aug 2014
Get This Now


CW Special Report on IBM
sponsored by ComputerWeekly.com
IT BRIEFING:This special 12-page report from Computer Weekly analyses the challenges facing IBM, its financial performance, the services it offers, its place in the IT market and its future strategy..
Posted: 15 Aug 2014 | Published: 15 Aug 2014
Get This Now


Computer Weekly – 12 August 2014: The rise of home automation
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, we look at the latest developments in smart home technology and the opportunities it presents for businesses. Our new buyer's guide examines the options for setting up an enterprise app store. And we find out how in-store tracking technology could improve the retail experience for shoppers. Read the issue now.
Posted: 11 Aug 2014 | Published: 12 Aug 2014
Get This Now


CW Europe – August Edition
sponsored by ComputerWeekly.com
EZINE:The hype around data mining may have receded, but it remains a critical discipline for the data scientist. This issue of CW Europe looks at what exactly data mining is, how and when it is used – and why it should not be mistaken for business analytics.
Posted: 07 Aug 2014 | Published: 07 Aug 2014
Get This Now


Computer Weekly – 5 August 2014: Driving virtualisation into pole position in Formula One
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, we find out how the Caterham F1 team has used virtualisation in its trackside technology to help race performance. We analyse how growing competition in the cloud market is affecting Amazon Web Services' dominant position. And we look at an emerging datacentre technology - silicon photonics. Read the issue now.
Posted: 04 Aug 2014 | Published: 04 Aug 2014
Get This Now


A Terrorists Utilisation of the Internet
sponsored by ComputerWeekly.com
RESOURCE:As the technological landscape continues to evolve, cyber-criminals and cyber-terrorists are utilsing the internet and web based tools to help carry out their attacks. In this essential guide, experts delve deeper into the current threat and its potential evolution. To learn more, simply participate in our brief Vulnerability Management Survey.
Posted: 30 Jul 2014 | Published: 30 Jul 2014
Get This Now


Network Management: In with the New, Out with the Old
sponsored by ComputerWeekly.com
RESOURCE:Networking departments are in the midst of a technological revolution. Download Computer Weekly's Buyer's Guide to Networks to discover how a network virtualisation movement intends to replace proprietary hardware controls with virtualised software equivalents. Simply take our brief Network Management Survey to get immediate access to the guide.
Posted: 30 Jul 2014 | Published: 30 Jul 2014
Get This Now


Baffled by managing digital identity?
sponsored by ComputerWeekly.com
RESOURCE:Download your exclusive edition of Computer Weekly Buyer's Guide to Managing Identity & Access to answer your questions regarding digital identity and the impact it has on your organisation. To access your complimentary guide please take our Identity and Access Management Survey. We look forward to hearing from you.
Posted: 30 Jul 2014 | Published: 30 Jul 2014
Get This Now


Learn everything you need to know about Business Tablets & their effect on the industry
sponsored by ComputerWeekly.com
RESOURCE:Access an exclusive copy of Computer Weekly Buyer's Guide to Business Tablets to get an inside look at the impact tablets are having on organisations. To get your complimentary edition to the guide please take our brief Email Security Survey to help us continue to deliver the most relevant and up to date information regarding the topic.
Posted: 30 Jul 2014 | Published: 30 Jul 2014
Get This Now


Are you using the right tablet device?
sponsored by ComputerWeekly.com
RESOURCE:Is your tablet device the right tablet device for your business? Participate in our Web Security Research Program to find out. Upon completion of the survey, you will get immediate access to Computer Weekly Buyer's Guide to Business Tablets, where CW reveals the ins-and-outs of the tablet devices on the market.
Posted: 30 Jul 2014 | Published: 30 Jul 2014
Get This Now


Challenges with Cloud Security?
sponsored by ComputerWeekly.com
RESOURCE:Cloud information security is an issue. Download an exclusive copy of Encryption in the Cloud & see why industry experts say that cloud encryption is the key to making cloud computing more attractive for potential users that are concerned with data security. To access this resource, simply take our brief Cloud Security Survey!
Posted: 30 Jul 2014 | Published: 30 Jul 2014
Get This Now


Participate in our Customer Experience and Customer Relationship Management Research Program!
sponsored by ComputerWeekly.com
RESOURCE:Access your copy of Improving the Customer Experience Through Technology to get an inside look at what CRM professionals are doing to maintain a single view of a customer's history and contact information & the importance of offering multiple communication points. Simply take our CEM & CRM survey to access your complimentary guide.
Posted: 29 Jul 2014 | Published: 29 Jul 2014
Get This Now


Under-represented and Undervalued
sponsored by ComputerWeekly.com
PRESENTATION:In this presentation from Computer Weekly's Women in IT event, Gillian Arnold talks about the current skills crisis in the technology industry, and recruiting skills for a more diverse base into enterprises.
Posted: 29 Jul 2014 | Published: 29 Jul 2014
Get This Now


Computer Weekly – 29 July 2014: Going mobile in financial services
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, in a highly-regulated sector such as financial services, enabling staff mobility is a challenge – we hear from IT leaders that have made it work. We ask why small businesses are so poorly prepared for cyber attacks. And we examine the key storage technologies in the Openstack cloud platform. Read the issue now.
Posted: 28 Jul 2014 | Published: 28 Jul 2014
Get This Now


Application data security risks on Android devices
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Security Series argues that personal and sensitive application data stored on smartphones is not as secure as people think and looks at controls that can reduce the risk.
Posted: 23 Jul 2014 | Published: 23 Jul 2014
Get This Now


Security issues in Vanets
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Security Series analyses the security risks of Vehicular ad-hoc networks (Vanets), an important component of intelligent transportation systems.
Posted: 23 Jul 2014 | Published: 23 Jul 2014
Get This Now


HR Tech Europe 2014 - European Conference & Expo
sponsored by ComputerWeekly.com
BROCHURE:HR Tech Europe is Europe's most important event on how software, technology systems and collaborative tools are bringing about surmountable change in the way people and organisations work. Register now to join us in Amsterdam on 23-24 October - download your 2 for 1 Discount code here!
Posted: 07 Aug 2014 | Published: 04 Sep 2014
Get This Now


1 - 25 of 932 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement