CSI Reports

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by TechTarget Customer Experience
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

TechTarget Customer Experience

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

IBM DeveloperWorks
sponsored by IBM
SOFTWARE DOWNLOAD: The Internet provides great opportunities for networking and learning – and IT is no different. Register now for developerWorks and create your profile for access, not only to articles, webcasts and software downloads, but also a wealth of other IT professionals.
Posted: 09 Jun 2011 | Premiered: 09 Jun 2011

IBM

Computer Weekly 16 August 2011: Read our analysis of the week’s biggest news stories in IT and in-depth features examining the latest technology trends
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this week’s issue of Computer Weekly we kick-off a programme of content aimed at providing a resource for IT training, education and career development. We also look at the controversial supplier contracts for the NHS IT programme, and examine the challenges of Big Data - plus our usual analysis of the week’s news. Download the latest issue now.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

TechTarget ComputerWeekly.com

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

Security Appliances: New Strides in Preventing Intrusions
sponsored by IBM
WHITE PAPER: According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

Container technologies and trends: What enterprises need to know
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we take a look at how and why enterprises are tapping into containers to bolster the business agility of their IT infrastructure and application estates, and some of the latest thinking about how best to utilise container technologies.
Posted: 08 Feb 2021 | Published: 18 Jan 2021

TechTarget ComputerWeekly.com

Container technologies and trends: What enterprises need to know
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we take a look at how and why enterprises are tapping into containers to bolster the business agility of their IT infrastructure and application estates, and some of the latest thinking about how best to utilise container technologies.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

TechTarget ComputerWeekly.com

Achieving Persistent Backup for Kubernetes
sponsored by Catalogic Software
EGUIDE: Explore this expert guide to learn how persistent backup for Kubernetes can be achieved with CloudCasa and learn how new backup strategies are changing IT approaches to container management.
Posted: 28 Sep 2021 | Published: 10 Aug 2021

Catalogic Software

CW APAC, February 2020: Expert Advice: Container Storage
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on storage in the Asia-Pacific region, Computer Weekly looks at how container applications can make companies more agile, the cost benefits of data storage and the most common data storage myths that need to be debunked.
Posted: 08 Feb 2021 | Published: 13 Feb 2020

TechTarget ComputerWeekly.com

Data Security in the E-discovery Process
sponsored by TechTarget Security
EBOOK: In this eBook from the experts at SearchCompliance.com, discover all you need to know about e-discovery, compliance, and data security in order to plan for success in your organization. Find out how effective records management can ease the pain of e-discovery, how Web forensics can help protect your data, and more.
Posted: 12 May 2011 | Published: 04 Oct 2011

TechTarget Security

Master Storage for Complex IoT and Cloud Environments
sponsored by Portworx
EGUIDE: Read this expert guide to learn how solutions like persistent storage in the cloud, Kubernetes-based backups, and stateful containerized backup from organizations like Portworx can be used to master challenging storage situations like IoT and cloud environments.
Posted: 03 Jun 2021 | Published: 28 May 2021

Portworx

Protecting Kubernetes Applications with Dell PowerProtect Data Manager
sponsored by Dell Technologies
WHITE PAPER: Download this white paper for a close look at the unique challenges encountered when protecting Kubernetes environments… and find out how Dell PowerProtect Data Manager can help.
Posted: 07 May 2024 | Published: 07 May 2024

TOPICS:  .NET
Dell Technologies

Buyer's guide to backup and recovery software
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.
Posted: 14 Jul 2022 | Published: 14 Jul 2022

TechTarget ComputerWeekly.com

Presentation Transcript: VDI in Branch Offices
sponsored by Virtual Bridges
PRESENTATION TRANSCRIPT: This transcript of the video "Using VDI at a Branch Office" , featuring desktop virtualization experts Brian Madden and Gabe Knuth, provides guidelines for extending central management to remote locations.
Posted: 19 Nov 2010 | Published: 19 Nov 2010

Virtual Bridges

Primary Storage: Large Enterprises
sponsored by Infinidat
RESEARCH CONTENT: As primary storage continues to evolve to fit organizations’ ever-changing needs, many enterprises are searching for solutions that can meet their expectations. However, primary storage isn’t one size fits all. So, how can you find a system that best fits your company’s needs? Browse this report to learn more.
Posted: 26 Sep 2023 | Published: 26 Sep 2023

TOPICS:  .NET
Infinidat

How to implement ITSM and establish a strategy beyond IT metrics
sponsored by TechTarget CIO
EGUIDE: In this expert e-guide, learn how one CIO was able to leverage ITSM to improve business processes as well as incorporate the ITSM strategy to a mobile workforce.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

TechTarget CIO

CloudCasa Backup-as-a-Service
sponsored by Catalogic Software
DATA SHEET: Explore this Evaluator Group product brief to learn about the usage and deployment of Catalogic CloudCasa and see what sets it apart from the competition.
Posted: 22 Oct 2021 | Published: 22 Oct 2021

TOPICS:  Backups
Catalogic Software

The Hybrid Cloud Journey Takes Time, but Well Worth the Wait
sponsored by VMware and VCE
EGUIDE: This expert guide will help you as you look to move your SAP environment to the cloud.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

VMware and VCE

CloudCasa - Kubernetes and Cloud Database Backup as a Service
sponsored by Catalogic Software
WHITE PAPER: CloudCasa helps organizations quickly and easily backup their complex cloud applications from Kubernetes environments to cloud databases, without extensive prior expertise. Read on learn more about CloudCasa’s offerings, including free storage management via one centralized platform that makes it easy to back up and recover your critical data.
Posted: 24 Aug 2021 | Published: 24 Aug 2021

TOPICS:  Backups
Catalogic Software

CW APAC - October 2019: Expert Advice on storage
sponsored by TechTarget ComputerWeekly.com
EZINE: The creation of ever-increasing volumes of data is posingescalating problems for storage. In this issue of Expert Advice, Computer Weekly looks at how APAC firms are dealing with storage management issues in the cloud age. Read the issue now.
Posted: 08 Feb 2021 | Published: 17 Oct 2019

TechTarget ComputerWeekly.com

Scale Your SOC with Cortex
sponsored by Palo Alto Networks
EBOOK: As financial institutions adopt direct internet access to optimize the end-user experience, it becomes difficult to inventory and manage all of these connections centrally, and each untracked internet connection is a potential point of exposure. Download this e-book to learn how to scale your SOC and automate your attack surface management.
Posted: 20 May 2023 | Published: 20 May 2023

TOPICS:  .NET
Palo Alto Networks

Computer Weekly – 4 April 2023: Revitalising UK digital government
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK plummets down the international rankings for digital government, can its £400m identity system revitalise the UK's digital strategy? Read the issue now.
Posted: 03 Apr 2023 | Published: 04 Apr 2023

TechTarget ComputerWeekly.com

Enterprises Wear Large Targets in Cloud Cryptomining Hacks
sponsored by Cisco Umbrella
EGUIDE: Cryptojacking, the unauthorized use of a computer to mine cryptocurrencies, is on the rise and has put security teams on alert. For this reason, enterprises are adjusting their strategies and applying dedicated approaches to cloud security. Read on to find out how your organization can join this trend to protect its most sensitive data.
Posted: 23 Aug 2018 | Published: 28 Mar 2018

Cisco Umbrella

Flexible & Secure Edge Application Infrastructure from SUSE & HPE
sponsored by SUSE
WHITE PAPER: In today’s app dev climate, long development cycles are no longer a viable option.With organizations operating closer to real-time than ever before, the edge is now paramount. Download this white paper to see how SUSE provides trusted open-source Linux, Kubernetes via Rancher, and security tools.
Posted: 08 May 2024 | Published: 08 May 2024

TOPICS:  .NET
SUSE

The State of Software Supply Chain Security 2024
sponsored by ReversingLabs
RESEARCH CONTENT: Over the last 3 years, supply chain attacks rose 1300%. This report is designed to give readers a map with which they can navigate the landscape of software supply chain security, exploring some of the high-level trends in software supply chain threats and how recent attacks provide insight into what’s to come. Read on to learn more.
Posted: 22 Feb 2024 | Published: 22 Feb 2024

TOPICS:  .NET
ReversingLabs

Kubernetes Data Protection Heavy on Automation, Integration
sponsored by Catalogic Software
EGUIDE: While Kubernetes applications are designed for resiliency, capabilities built in for backup and operational recovery are often lacking. That's why organizations need third-party Kubernetes data protection. Access this custom e-guide to learn about new Kubernetes offerings that can help your organization defend against ransomware.
Posted: 07 Nov 2022 | Published: 03 Nov 2022

TOPICS:  .NET
Catalogic Software

Application Hardening: Evolving Techniques for Proactive Enterprise Application Security
sponsored by TechTarget Security
EBOOK: This expert guide from SearchSecurity.com provides crucial tips for creating an effective threat and vulnerability management program and examines how you can strengthen and streamline your application security.
Posted: 21 Oct 2013 | Published: 21 Oct 2013

TechTarget Security

CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Schiphol Airport in Amsterdam is one of Europe's main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

TechTarget ComputerWeekly.com

CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport
sponsored by TechTarget ComputerWeekly.com
EZINE: Schiphol Airport in Amsterdam is one of Europe’s main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.
Posted: 08 Feb 2021 | Published: 13 Aug 2020

TechTarget ComputerWeekly.com