IT Systems  >   Communications Networks  >  

Global Internet

RSS Feed    Add to Google    Add to My Yahoo!
Global Internet Reports
 
Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Met Office: The changing role of social media
sponsored by ComputerWeekly.com
CASE STUDY: Dave Britton, chief press officer of the Met Office, explains how the Met has harnessed social media, in this presentation.
Posted: 30 Apr 2012 | Published: 25 Apr 2012

ComputerWeekly.com

Herding Geese: The Retail Supply Chain
sponsored by ComputerWeekly.com
BOOK: Steven Keifer draws on the pioneering work of US retailer, Walmart, to explain the essentials of EDI in the retail supply chain.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

Computer Weekly – 31 May 2016: The rise of machine intelligence
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how machine intelligence is becoming increasingly commoditised – and what it means for enterprise IT. After Three's takeover of O2 was blocked, we look at the future for the UK's mobile operators. And we find out about attempts to address some of the fundamental flaws of the internet. Read the issue now.
Posted: 27 May 2016 | Published: 23 May 2016

ComputerWeekly.com

WHY DO-IT-YOURSELF IN IOT LEADS TO FAILURE: Connecting Products Is a Business (Not a Technology) Problem
sponsored by Xively by LogMeIn
WHITE PAPER: Discover 5 common failures of DIY IoT, and how to eliminate the need for DIY altogether.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Xively by LogMeIn

How to Manage the Virtual, Automated Environment
sponsored by SearchSecurity.com
EGUIDE: SearchNetworking.com’s E-Guide on the new era of network management explores the challenges involved with cloud computing and virtualization and how to prevent and control VM sprawl.
Posted: 07 May 2012 | Published: 07 May 2012

SearchSecurity.com

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Readying your Infrastructure for the Internet of Things
sponsored by F5 Networks
WHITE PAPER: In this white paper you will discover how the IoT will impact our daily lives moving forward. Read on to learn how early adopters of IoT technology have seen benefits like enhanced customer service and improved use of field assets and devise a strategy to reap similar benefits in your organization.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

F5 Networks

Internet of Things (IoT) Reports and Videos
sponsored by SAP
WHITE PAPER: Access this resource portal to find a rich collection of Internet of Things (IoT) reports and videos revealing the technological, economic, and social impacts of the hyper-connected economy.
Posted: 19 Nov 2015 | Published: 19 Nov 2015

SAP

Symantec Internet Security Threat Report: Trends for 2011
sponsored by Symantec Corporation
WHITE PAPER: This threat report takes a thorough look back at the most significant threats, trends and outright attacks of the year that was. Read now for helpful tips and best practices for keeping your confidential information safe.
Posted: 25 May 2012 | Published: 30 Apr 2012

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement