Dynamic Services Reports

Audi fine-tunes its digital performance to boost online car sales
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Feb 2021

TechTarget ComputerWeekly.com

Fujitsu Software Interstage Business Operations Platform: A foundation for Smart Process Applications
sponsored by Fujitsu
WEBCAST: To enable business innovation and collaboration, you need a way to enhance your existing ERP systems. In this webcast, learn how Smart Process apps give you ERP agility, what you need to create them, and how a business operations platform can serve as a foundation for these Smart Process apps.
Posted: 22 Jul 2013 | Premiered: Apr 10, 2013

Fujitsu

Architecture Plan and Design Best Practices: Outputs, Interfaces, and Scheduling
sponsored by IBM
EGUIDE: Consult this expert e-guide for advice from Gartner Vice President Anne Thomas Manes and other IT professionals on architecture planning, design best practices, and new approaches to building services with service-oriented architecture (SOA).
Posted: 13 Mar 2014 | Published: 13 Mar 2014

IBM

Take new approaches to building services with SOA
sponsored by IBM
EGUIDE: Speaking of mobile, social, and cloud trends, distinguished VP at Gartner Anne Thomas Manes said, "We have all of these forces now driving us to change the way we design our architectures." A more consumer-driven approach to services requires a new way of building services -- and service-oriented architecture (SOA) methods can help.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

IBM

A Case for IT Security: The Future of New EU Data Protection
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

TechTarget ComputerWeekly.com

Gartner Sees Cloud Computing, Mobile Development Putting IT on Edge
sponsored by IBM
EGUIDE: This fall, Gartner Inc.'s 2012 ITxpo conference centered around the highly disruptive, consumer-driven group of phenomena that consists of cloud computing, Web information, mobile devices, and social media innovations. Read this expert e-guide to find out what conclusions Gartner reached about how IT should be adjusting.
Posted: 18 Dec 2012 | Published: 17 Dec 2012

IBM

API Design: How to Properly Build an Application Program Interface
sponsored by IBM
EGUIDE: What should you keep in mind while creating APIs? Find out in this expert Solution Spotlight, where you'll receive guidelines for building an API the right way to achieve functional integration and developer loyalty.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

IBM

Gunner Peterson's Security Gateway Buyer’s Guide
sponsored by Intel
WHITE PAPER: Independent industry security expert Gunnar Peterson provides the analysis and decision support that will enable you make an informed choice when evaluating Security Gateways. This guide describes security architecture capabilities, common business use cases, and deployment considerations.
Posted: 25 Mar 2011 | Published: 25 Mar 2011

Intel

Under new cloud management: What the future holds for AWS
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we take a look at some of the challenges facing AWS in greater detail, while also taking a closer look at what the future might hold for AWS under the charge of its new CEO, and how its customers are choosing to consume its technology in 2021.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TechTarget ComputerWeekly.com

Bring Your Own Security to the Cloud
sponsored by CenterBeam
VIDEO: Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
Posted: 12 Jun 2013 | Premiered: 12 Jun 2013

CenterBeam