Auditing (Systems Operations) Reports

Making the business case for quantum computing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Tech startups, investors, major suppliers and even leading-edge companies are already placing a bet on the future of quantum computing. In this e-guide, we hear from experts in the tech sector, business consultancies and international corporations as they examine the potential of quantum computing.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

TechTarget ComputerWeekly.com

Computer Weekly – 8 November 2016: The march of the robot workers
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.
Posted: 08 Feb 2021 | Published: 08 Nov 2016

TechTarget ComputerWeekly.com

Quantum computing in action
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we look at Finland and how state investment is being used in a milestone project involving public and private sector organisations to understand the applications of the technology. And we hear how Spanish bank BBVA is examining the complex financial problems that could be solved by quantum computing.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

TechTarget ComputerWeekly.com

Computer Weekly – 25 August 2020: When algorithms don't play fair
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we report on the auditing of algorithms to countervail bias. We examine what CISOs can learn from Covid-19. And we assess how competent AI is at building applications that deliver the best possible customer experience, in our buyer's guide to modern software development. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Aug 2020

TechTarget ComputerWeekly.com

IR35 reforms: Confusion over who pays employers’ NI leaves IT contractors out of pocket
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Litigators are circling as thousands of contractors realise that the 2017 roll-out of IR35 reforms to the public sector may have resulted in unlawful tax deductions – and the private sector could be next.
Posted: 27 Aug 2021 | Published: 26 Aug 2021

TechTarget ComputerWeekly.com

Hardware Neutral Imaging with ImageX: The Ghost Killer
sponsored by Global Knowledge
WHITE PAPER: Learn how ImageX can help facilitate successful image management and lower the total cost of ownership of your Vista implementation.
Posted: 14 Mar 2007 | Published: 01 Mar 2007

Global Knowledge

Webinar: Getting Hadoop Through an IT Audit
sponsored by WANdisco
WEBCAST: Join this webinar from GigaOM Research and WANdisco to learn how enterprises are hardening Hadoop across global data centers to ensure continuous availability, even during maintenance windows.
Posted: 08 May 2014 | Premiered: May 8, 2014

WANdisco

Taking Control of Software Licensing
sponsored by BDNA
WHITE PAPER: Software licensing is full of complexity and factors outside your control. Having accurate information is the best strategy for managing vendors, negotiating with them, and avoiding vendor audits. This paper offers insight to enter conversation...
Posted: 30 Apr 2008 | Published: 01 Apr 2008

BDNA

Lumension Endpoint Protection - Whitelisting Technology Improves Security, Reliability, and Performance via Trusted Change
sponsored by Lumension
WHITE PAPER: Learn how whitelisting guards your systems by allowing only approved processes and applications to run on the endpoint and preventing malware and viral programs. With whitelisting technology, you can improve total data security and overall system performance.
Posted: 12 Aug 2009 | Published: 01 Sep 2008

Lumension

Guide: Active Administrator
sponsored by ScriptLogic Corporation
WHITE PAPER: Active Directory becomes very complex to manage in Windows networks. Administrators leave, users are given elevated privileges, applications require special accounts - very soon you have an Active Directory full of security weaknesses.
Posted: 28 Aug 2009 | Published: 20 Jul 2009

ScriptLogic Corporation