All resources sponsored by:

ComputerWeekly.com

1 - 25 of 1138 Matches
Computer Weekly – 28 April 2015: The National Trust's great IT renovation
sponsored by ComputerWeekly.com
EBOOK:In this week's Computer Weekly, we talk to the CIO of the National Trust, Sarah Flannigan, about her £40m IT strategy to transform one of the UK's favourite charities. We examine best practice in how to set up applications on Amazon Web Services. And we talk to a UK challenger bank about how technology will shake up the sector. Read the issue now.
Posted: 24 Apr 2015 | Published: 24 Apr 2015
Get This Now


Computer Weekly – 21 April 2015: The future of Moore's Law at 50
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, Moore's Law – the seminal forecast by Intel founder Gordon Moore that oversees technology development – is 50 years old. We look at its modern relevance and future implications. IT chiefs discuss whether Windows is still core to their strategy. And we look back at five years of government IT. Read the issue now.
Posted: 17 Apr 2015 | Published: 17 Apr 2015
Get This Now


Thingalytics
sponsored by ComputerWeekly.com
BOOK:Thingalytics by Dr John Bates is one of the most powerful books written to date about the internet of things (IoT), showing businesses how to take advantage of the fast big data that flows from the digital planet.
Posted: 14 Apr 2015 | Published: 14 Apr 2015
Get This Now


No more excuses: VDI is ready!
sponsored by ComputerWeekly.com
EGUIDE:There are a lot of reasons to avoid implementing VDI. Access this e-guide with advice from desktop virtualization expert Brian Madden who directly addresses concerns on storage, graphical experience and non-persistent desktops.
Posted: 14 Apr 2015 | Published: 14 Apr 2015
Get This Now


Computer Weekly – 14 April 2015: Taking stock of e-commerce systems
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, the first of our three-part buyer's guide to next generation e-commerce looks at managing inventory in multi-channel retailers. We highlight the six technology companies that are threats to the dominance of high-street banks. And we examine the top five issues in virtual machine backup. Read the issue now.
Posted: 10 Apr 2015 | Published: 10 Apr 2015
Get This Now


CW Europe – April 2015
sponsored by ComputerWeekly.com
EZINE:With the datacentre industry a major consumer of non-renewable energy, it continues to come under fire from environmental campaigners and users to clean up its act. In this issue of CW Europe,Computer Weekly datacentre editor Caroline Donnelly investigates energy-efficient Europe and how the technology industry is keeping the continent clean.
Posted: 06 Apr 2015 | Published: 07 Apr 2015
Get This Now


Event insight: Key takeaways from Cloud Expo Europe and Data Centre World
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This report looks at the key talking points from the recent Cloud Expo Europe and Data Centre World events.
Posted: 01 Apr 2015 | Published: 01 Apr 2015
Get This Now


Computer Weekly – 31 March 2015: What went wrong with the IT for farmers' rural payments?
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, we examine the real reasons behind the failure of the government's rural payments digital service. We look at how Windows 10 Universal Apps will change the way IT teams manage PCs. And we hear from IT leaders about their experiences of bringing cloud computing into the mainstream. Read the issue now.
Posted: 27 Mar 2015 | Published: 27 Mar 2015
Get This Now


Staying the course as a CIO
sponsored by ComputerWeekly.com
BOOK:In this extract from his book, Staying the Course as a CIO, Jonathan M. Mitchell looks at the challenges of managing IT projects.
Posted: 27 Mar 2015 | Published: 27 Mar 2015
Get This Now


Computer Weekly buyer's guide to data science
sponsored by ComputerWeekly.com
EBOOK:In this 10-page buyer's guide, Computer Weekly looks at how, with the open data movement taking hold and data analytics technology becoming increasingly sophisticated, data science is finding its use in a variety of fields.
Posted: 26 Mar 2015 | Published: 26 Mar 2015
Get This Now


Computer Weekly – 24 March 2015: Government backs tech in 2015 Budget
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, chancellor George Osborne's 2015 Budget was the most technology friendly ever – we examine the key policy announcements. Sainsbury's CIO talks about the challenges of going digital. And we look at how virtual reality could be coming to a workplace near you, thanks to the latest developments. Read the issue now.
Posted: 23 Mar 2015 | Published: 20 Mar 2015
Get This Now


Cloud options investigated
sponsored by ComputerWeekly.com
PRESENTATION:Arriva interim head of IT readiness Stuart Curley offers some tips on procuring cloud services in this PowerPoint presentation for Computer Weekly's CW500 club for senior IT leaders.
Posted: 17 Mar 2015 | Published: 17 Mar 2015
Get This Now


Tech Trends 2015
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:Deloitte's sixth Annual Tech Trends Report reveals the top macro technology developments that will disrupt businesses in the next 18-24 months.
Posted: 16 Mar 2015 | Published: 16 Mar 2015
Get This Now


Big & Fast Data: The rise of insight-driven business
sponsored by ComputerWeekly.com
RESEARCH CONTENT:This report from Capgemini and EMC, which surveyed more than 1,000 C-suite and senior decision makers around the world, looks at enterprise readiness for big data.
Posted: 16 Mar 2015 | Published: 16 Mar 2015
Get This Now


Computer Weekly – 17 March 2015: Smartwatches mean business
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, we examine the potential enterprise uses of the Apple Watch, and find out what sort of apps might work for businesses. Our latest buyer's guide discusses the future of the desktop computer. And we look at how technology is being used to improve customer experience for big consumer-facing organisations.
Posted: 13 Mar 2015 | Published: 13 Mar 2015
Get This Now


Information security in the retail chain
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series looks at how automated distribution centres play a business-critical role in the retail supply chain, and any challenge to their continuous availability and the services they provide must be overcome.
Posted: 12 Mar 2015 | Published: 12 Mar 2015
Get This Now


Mitigating the cyber threat from malicious insiders
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series provides an examination of a malicious insider attack as a sequence of phases and a practical 10-step programme for mitigating the threat.
Posted: 12 Mar 2015 | Published: 12 Mar 2015
Get This Now


Trends in packing and obfuscation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series looks at how two modern malware methods fit into today's landscape of advanced persistent threat and cyber crime as a service, and what the security industry can do to defend against them.
Posted: 12 Mar 2015 | Published: 12 Mar 2015
Get This Now


Building trust in the security of RFID systems
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series looks at the growing need for automated tools to verify protocols and address concerns over security and privacy.
Posted: 12 Mar 2015 | Published: 12 Mar 2015
Get This Now

TOPICS:  RFID | Security

Verifying the integrity of open source Android apps
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series looks at how researchers can determine whether an app was built from its published source code.
Posted: 12 Mar 2015 | Published: 12 Mar 2015
Get This Now


Business risks of software vulnerabilities
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series looks at how four sources of risk are relevant for evaluating the influence of software vulnerabilities on businesses.
Posted: 12 Mar 2015 | Published: 12 Mar 2015
Get This Now


Clustering to counter Android malware
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series looks at how the rapid growth of new Android malware calls for automated tools to help malware analysts.
Posted: 11 Mar 2015 | Published: 11 Mar 2015
Get This Now


Combating Android app repackaging attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series looks at how apps repackaged through reverse engineering pose a big security risk to the Android smartphone operating system.
Posted: 11 Mar 2015 | Published: 11 Mar 2015
Get This Now


Mac OS X persistent evidences for forensic purposes
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series provides a technical explanation of how Mac OS X persistence evidences can be extracted for forensic investigation.
Posted: 11 Mar 2015 | Published: 11 Mar 2015
Get This Now


Symbolic adversary modelling in smart transport ticketing
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:This article in our Royal Holloway Information Security Thesis Series looks at possible extensions of a process algebra language used to support modelling of smart transport ticketing systems.
Posted: 11 Mar 2015 | Published: 11 Mar 2015
Get This Now


1 - 25 of 1138 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement