Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER:
The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005
|
|
|
Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server
sponsored by Veritas
WHITE PAPER:
Learn about a comprehensive technology for customers that want quick recovery and off-host backup support. Eliminate backup windows, reduce the performance load on application servers, and quickly bring applications back online after data c...
Posted: 19 Nov 2007 | Published: 01 Mar 2007
|
|
|
7 Types of Hard CISSP Exam Questions and How to Approach Them
sponsored by Global Knowledge
WHITE PAPER:
Learn about the seven types of hard questions you are likely to see on the CISSP examination and the best approaches for solving them.
Posted: 03 Apr 2006 | Published: 01 Mar 2006
|
|
|
The 2008 (ISC)2 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER:
Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
Posted: 03 Jun 2008 | Published: 03 Jun 2008
|
|
|
Managing Storage: Trends, Challenges, and Options
sponsored by EMC Corporation
WHITE PAPER:
With the explosion of data, storage environments are becoming more complex. Poorly designed storage infrastructures are putting companies at risk. Download this study to learn how storage managers built stronger storage management teams and environments.
Posted: 31 Jul 2006 | Published: 01 Jul 2006
|
|
|
Securing the Organization: Creating a Partnership between HR and Information Security
sponsored by ISC2
WHITE PAPER:
The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
Posted: 14 Apr 2009 | Published: 09 Sep 2008
|
|
|
CW@50: What was making the news in June
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
Posted: 08 Feb 2021 | Published: 03 Jun 2016
|
|
|
The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022
|
|
|
How to become an artificial intelligence engineer, step by step
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Artificial intelligence engineers are in great demand and typically earn six-figure salaries. In this e-guide, learn what it takes to launch a rewarding career as an AI engineer, including required skills, responsibilities, qualifications, educational opportunities and top salaries.
Posted: 28 Apr 2022 | Published: 28 Apr 2022
|
|
|
Index Engines’ CyberSense Validated 99.99% Effective In Detecting Ransomware Corruption
sponsored by Index Engines
ESG TECHNICAL VALIDATION REPORT:
75% of organizations surveyed by Informa TechTarget's Enterprise Strategy Group experienced at least one ransomware attack in the past year. Bolstering defenses against this prevalent threat requires securing backup data. In this analyst report, find out how you can detect ransomware corruption within backups with 99.99% effectiveness.
Posted: 03 Oct 2024 | Published: 03 Oct 2024
|
|
|
Zero Trust Success Stories How Companies Use Zscaler To Embrace Digital Transformation Securely And Cost Effectively
sponsored by Zscaler
EBOOK:
In this e-book, you'll discover how midmarket companies like Baker & Baker, TT Electronics, and NIBCO leveraged Zscaler's Zero Trust Exchange to enhance security, reduce costs, and improve user experience. Read on now to see how a zero trust approach can benefit your organization.
Posted: 03 Dec 2024 | Published: 03 Dec 2024
|
|
|
Zero Trust Success Stories How Companies Use Zscaler To Embrace Digital Transformation Securely And Cost Effectively
sponsored by Zscaler
EBOOK:
In this e-book, you'll discover how midmarket companies like Baker & Baker, TT Electronics, and NIBCO leveraged Zscaler's Zero Trust Exchange to enhance security, reduce costs, and improve user experience. Read on now to see how a zero trust approach can benefit your organization.
Posted: 20 Mar 2025 | Published: 03 Dec 2024
|
|
|
Improve cyber resiliency and protect data from cyber ransomware threats by using an isolated vault, AI-based ML analytics software, and more
sponsored by Index Engines
WHITE PAPER:
Improve cyber resilience and protect data from ransomware threats with Dell PowerProtect Cyber Recovery's isolated vault, AI-based analytics, and recovery capabilities. Download this white paper to learn how you can strengthen your data protection strategy.
Posted: 31 Oct 2024 | Published: 01 Nov 2024
|
|
|
Computer Weekly - 4 May 2021: How KFC put digital on the menu
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how fast-food chain KFC turned to digital to survive the pandemic. Our latest buyer's guide looks at technologies to improve office productivity for home workers. And we assess the growing problem of electronic waste and how to tackle it. Read the issue now.
Posted: 03 May 2021 | Published: 04 May 2021
|
|
|
A Five-Step Roadmap to Building Your Mobility Strategy
sponsored by Zebra Technologies
WHITE PAPER:
Electronic health record systems have become the industry standard for many patient care applications and processes. Yet caregivers at the patient’s bedside don’t always have immediate access to this critical information. View this report to access 5 critical steps to developing a clinical mobility strategy for your healthcare facility.
Posted: 19 Apr 2024 | Published: 19 Apr 2024
|
|
|
Dutch organisations demand more from government
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.
Posted: 08 Feb 2021 | Published: 09 Dec 2019
|
|
|
Automated document management system tools transform workflows
sponsored by TechTarget ComputerWeekly.com
EBOOK:
In this e-guide, we examine the components of a viable DMS and the technologies influencing its broader acceptance, how e-signatures are powering DM Simplementations, the differences between electronic and digital signatures, and the role of automated document management system tools in ensuring continuity for the new hybrid workforce.
Posted: 16 Dec 2021 | Published: 16 Dec 2021
|
|
|
Computer Weekly – 17 September 2024: The pillars of AI strategy
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to the CIO of Currys about the electronics retailer's AI strategy. We examine how China has become a leader in open source software – and what it means for the rest of the world. And we look at how AI is supporting networking alongside how to implement networking to support AI. Read the issue now.
Posted: 16 Sep 2024 | Published: 17 Sep 2024
|
|
|
Protecting Patient and Healthcare Provider Data with LogRhythm SIEM
sponsored by Exabeam
WHITE PAPER:
LogRhythm SIEM helps healthcare organizations protect patient and provider data by offering real-time visibility into network activity and threats. It integrates with electronic health record systems, simplifies HIPAA compliance, and reduces security team workload through automation. Discover how LogRhythm can enhance your organization's security.
Posted: 26 Mar 2025 | Published: 26 Mar 2025
|
|
|
Harnessing AI: Transformative Impacts and Predictive Power in Healthcare
sponsored by XtelligentMedia Healthcare
EGUIDE:
In the healthcare industry artificial intelligence is now a game-change supporting medical research, patient care and overall system operations. Predictive tools for spine surgery outcomes were surpassed by a machine learning approach that combined ecological momentary assessment data, wearable data and electronic health records.
Posted: 28 Jul 2024 | Published: 29 Jul 2024
|
|
|
Hacking the Human Operating System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
Posted: 08 Feb 2021 | Published: 27 Feb 2017
|
|
|
CW Benelux - May 2017: 3D printing on the rise
sponsored by TechTarget ComputerWeekly.com
EZINE:
Is blockchain the future of your IT department? Is the next Google on the rise? Access the May 2017 issue of CW Benelux to learn about the current state of 3D printing in relation to smart applications, cloud-based ID management for public cloud strategy, how to rally your staff for IT innovation, and more.
Posted: 08 Feb 2021 | Published: 04 May 2017
|
|
|
Computer Weekly – 24 July 2018: Building intelligent aircraft engines with AI and analytics
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to Rolls-Royce about using AI, sensors and data analytics to build intelligent aircraft engines. Our latest buyer's guide examines the next generation of desktop IT. And we ask whether a court ruling in Chile could lead to a worldwide change in Oracle's software licensing practices. Read the issue now.
Posted: 08 Feb 2021 | Published: 20 Jul 2018
|
|
|
Computer Weekly – 18 February 2025: AI Action Summit calls for a rethink of regulation
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we report from the AI Action Summit in Paris on how easing red tape is overtaking safety as a priority. We examine the AI regulations that IT leaders need to understand. And we talk to the UK government's AI minister about the country's artificial intelligence opportunities. Read the issue now.
Posted: 18 Feb 2025 | Published: 18 Feb 2025
|
|
|
Michigan Medicine Innovating With Cloud Transformation
sponsored by NetApp
CASE STUDY:
Michigan Medicine is moving its Epic infrastructure to the cloud to boost efficiency, scalability, and patient care. CTO Tim Calahan highlights benefits like better disaster recovery and access to advanced tech, including generative AI. Read this white paper to see how cloud transformation is reshaping healthcare delivery.
Posted: 04 Mar 2025 | Published: 04 Mar 2025
|
|
|
Computer Weekly – 9 October 2018: NHS app marks a new era for UK health service
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the long-awaited mobile app from the NHS and ask what it means for a digital health service. We hear from early experimenters of blockchain to find out what it will take for the technology to be enterprise-ready. And we analyse the impact of M&A on corporate networks. Read the issue now.
Posted: 08 Feb 2021 | Published: 05 Oct 2018
|
|
|
Anti-Tampering Source Code Protection
sponsored by StarHub
PRODUCT OVERVIEW:
Mobile apps often contain valuable IP and sensitive data but lack proper code protection. Zimperium's zShield goes beyond basic obfuscation, offering anti-reverse engineering and anti-tampering features to secure applications from malicious actors. Discover how zShield safeguards your code while maintaining performance in the product overview.
Posted: 28 Mar 2025 | Published: 29 Mar 2025
|
|
|
Deep learning for countering energy theft – a hybrid long-short term memory approach
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.
Posted: 26 Apr 2022 | Published: 26 Apr 2022
|
|
|
Computer Weekly – 18 October 2016: Singapore aims to become a digital leader
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how the city-state of Singapore is investing in skills and technology to become a leading digital nation. We examine how to prevent legacy IT becoming a hindrance to digital transformation. And we look at the impact of controversial new tax rules on the UK's IT contractor community. Read the issue now.
Posted: 08 Feb 2021 | Published: 18 Oct 2016
|
|
|
E-government benchmark 2016
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
The results of the latest e-government benchmark show a cautious acceleration of e-government implementation in Europe.
Posted: 08 Feb 2021 | Published: 03 Feb 2017
|
|
|
Computer Weekly – 16 August 2016: Barriers to UK datacentre expansion
sponsored by TechTarget ComputerWeekly.com
EZINE:
A TechUK survey has found that the UK tech sector's confidence of growth over the next two years has dropped by 23 points, due to Brexit. In this week's issue, we look at how Asian investors are pulling out of datacentre investments. According to datacentre analyst Broadgroup, these investors have been quite spooked by the Brexit vote.
Posted: 08 Feb 2021 | Published: 16 Aug 2016
|
|