The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER:
This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012
|
|
|
The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER:
This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012
|
|
|
Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER:
The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005
|
|
|
Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER:
Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011
|
|
|
Technology, media and telecommunications predictions 2017
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Deloitte predicts the key trends in technology, media and telecommunications in 2017
Posted: 11 Jan 2017 | Published: 11 Jan 2017
|
|
|
CW Europe – January Edition
sponsored by TechTarget ComputerWeekly.com
EZINE:
Find out what analysts are predicting for technology in Europe this year, including changes in budgets and how companies can reduce costs and improve sustainability.
Posted: 07 Jan 2013 | Published: 07 Jan 2013
|
|
|
The Semantic Dialogues
sponsored by Progress
EBOOK:
The Semantic Dialogues tells the story of how National Networks, a fictional telecommunications service provider, pursued and achieved data interoperability within their SOA.
Posted: 28 Aug 2009 | Published: 28 Aug 2009
|
|
|
Lawful Interception of Telecommunication Services
sponsored by Utimaco
PRODUCT OVERVIEW:
Lawful Interception (LI) refers to the legally mandated surveillance of telecommunication services. The UTIMACO Lawful Interception Management System (LIMS) is a monitoring solution designed to help telecom operators and Internet service providers fulfill their legal obligation to Law enforcement agencies (LEAs). Download now to learn more.
Posted: 31 May 2023 | Published: 31 May 2023
|
|
|
CW Europe – May 2014 Edition
sponsored by TechTarget ComputerWeekly.com
EZINE:
Last year the European Union's 28 member states adopted guidelines for sharing basic clinical and administrative data on patients internationally, including the details of healthcare providers and insurers. This issue of CW Europe looks at how European Union (EU) countries vary in sharing patient records and exchanging data.
Posted: 01 May 2014 | Published: 01 May 2014
|
|
|
CW Europe - September-November 2022: Why Russia could become the world's biggest market for illegal IT
sponsored by TechTarget ComputerWeekly.com
EZINE:
Faced with international sanctions and the departure of many global IT suppliers from Russia, companies there are seeking alternative, and sometimes illegal, routes to access IT products. Also read how new requirements are driving scientists and engineers in Europe back to the lab to start developing 6G technology.
Posted: 01 Sep 2022 | Published: 09 Sep 2022
|
|
|
Computer Weekly – 21 June 2016: Will Brexit spell disaster for UK IT?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as the UK prepares to vote on membership of the EU, we take a detailed look at the effect a possible Brexit could have on the UK technology sector. Authors Don and Alex Tapscott explain the impact of blockchain on CIOs. And we look at the growth of consumer tech in enterprise IT. Read the issue now.
Posted: 17 Jun 2016 | Published: 21 Jun 2016
|
|
|
Winning the Future: The Business Case for Rapid Transformation
sponsored by Progress
EBOOK:
Transformation has become an overused buzzword, but its real meaning remains important. Under the microscope, operations transformation is about integrating operations silos and processes, merging disparate units in the wake of acquisitions, and reducing operational expenses.
Posted: 28 Aug 2009 | Published: 27 Aug 2009
|
|
|
Computer Weekly - 23 February 2021: Computers in space - managing a datacentre on the ISS
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as the International Space Station gets a datacentre upgrade, we look at the challenges of system maintenance in space. As nation states increase their cyber attacks, we assess the risk for businesses. And our latest buyer's guide looks at the colocation market. Read the issue now.
Posted: 15 Mar 2021 | Published: 23 Feb 2021
|
|
|
Computer Weekly – 1 March 2016: Protecting the UK from cyber attacks
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to the National Crime Agency's top cyber cop about tackling IT security threats against the UK through global collaborations. We ask CIOs for their tips on building an IT strategy for the digital age. And we review the big six storage suppliers' plans for all-flash arrays. Read the issue now.
Posted: 29 Feb 2016 | Published: 01 Mar 2016
|
|
|
CW ANZ: Fix the weak links
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.
Posted: 12 Jul 2018 | Published: 12 Jul 2018
|
|
|
CW EMEA - January 2023: Protecting the privacy of schoolchildren
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.
Posted: 11 Jan 2023 | Published: 12 Jan 2023
|
|
|
CW ANZ Trend Watch April 2019
sponsored by TechTarget ComputerWeekly.com
EZINE:
Australia has been touted as a leader in 5G and some industries look set to start benefiting soon. In this ComputerWeekly trend watch handbook, focused on business IT in Australia and New Zealand, find out more about successful 5G use cases and the opportunities they present.
Posted: 12 Apr 2019 | Published: 12 Apr 2019
|
|
|
CW Europe – June 2014 Edition
sponsored by TechTarget ComputerWeekly.com
EZINE:
Europe is on a quest for innovation, looking like it might even give California's Silicon Valley a run for its money in a few years' time. London's Silicon Roundabout in Old Street may be smaller than Silicon Valley in size and reputation; however it is often featured on the list of top ten best cities to begin a startup company.
Posted: 04 Jun 2014 | Published: 05 Jun 2014
|
|
|
Gamma International: The Macedonia files
sponsored by TechTarget ComputerWeekly.com
RESOURCE:
This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 23 Nov 2017 | Published: 23 Nov 2017
|
|
|
Endpoint Threat Detection Gets More Response
sponsored by Solarwinds MSP
EGUIDE:
This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
Posted: 01 Feb 2016 | Published: 25 Jan 2016
|
|
|
CW APAC - February 2022: Trend Watch - enterprise 5G
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, focused on enterprise 5G in the Asia-Pacific region, Computer Weekly looks at what the technology means for enterprises across the region.
Posted: 18 Feb 2022 | Published: 18 Feb 2022
|
|
|
Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Jun 2020
|
|
|
E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa
sponsored by TechTarget Security
EBOOK:
Read this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards.
Posted: 05 Feb 2010 | Published: 05 Feb 2010
|
|
|
APT Activity April 2023 – September 2023 Report
sponsored by ESET
RESEARCH CONTENT:
In recent history, there have been 4 major countries that have utilized cyber-attacks as a means of addressing political situations: China, Russia, Iran and North Korea. Download this new activity report from ESET to gain a foundational understanding of how these nations are using cyber operations in response to the latest geopolitical drivers.
Posted: 08 Nov 2023 | Published: 09 Nov 2023
|
|
|
Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020
|
|
|
Global Connectivity Index 2016
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
The Global Connectivity Index (GCI) 2016 from Huawei measures the progress of 50 nations in investing in and deploying Information and Communications Technology (ICT) to achieve economic digitisation
Posted: 27 Sep 2016 | Published: 28 Sep 2016
|
|
|
Computer Weekly - 26 October 2021: Managing cyber risk by integrating supply chains
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, our new Buyer's Guide examines the security and IT integration challenges of modern supply chains – we also talk to the CEO of SolarWinds about how the company overcame its huge supply chain attack. And we look at how a small town in Lancashire was chosen to host the UK's National Cyber Force. Read the issue now.
Posted: 22 Oct 2021 | Published: 26 Oct 2021
|
|
|
Computer Weekly - 31 March 2020: Can the internet take the strain?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as millions of people work from home, we examine the measures in place to make sure the internet stays up and running. Our latest buyer's guide looks at the best practice in application modernisation. And we find out how IT leaders are tackling the skills shortage to recruit the best tech talent. Read the issue now.
Posted: 08 Feb 2021 | Published: 31 Mar 2020
|
|
|
Computer Weekly - 25 May 2021: Making data an asset, not a threat
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the latest developments in the UK government's National Data Strategy and what it means for the economy. Our latest buyer's guide explains the emerging technologies around computational storage. And we look at the advances in customer experience management during the pandemic. Read the issue now.
Posted: 24 May 2021 | Published: 25 May 2021
|
|