Government Regulations Reports

CW EMEA - April 2024: The blueprint for safe GenAI
sponsored by TechTarget ComputerWeekly.com
EZINE: In the Netherlands, the government has formulated a vision document to guide its citizens and businesses on the safe and responsible use of GenAI.
Posted: 24 Apr 2024 | Published: 24 Apr 2024

TechTarget ComputerWeekly.com

Computer Weekly – 8 April 2025: Innovating for the arts at Royal Ballet and Opera
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how virtual reality and other tech innovations are helping Royal Ballet and Opera to stage world-class performances. After a spate of banking IT outages, we examine why further bank crashes are inevitable. And our new buyer's guide looks at how to get started with SLMs for AI. Read the issue now.
Posted: 07 Apr 2025 | Published: 08 Apr 2025

TechTarget ComputerWeekly.com

Computer Weekly – 21 January 2025: Will the UK become an AI powerhouse?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we analyse the UK government's new AI strategy and ask if the ambitious plans are achievable. The latest EU regulation affecting cyber security, called DORA, will affect digital resilience plans for many businesses – we examine the implications. Read the issue now.
Posted: 20 Jan 2025 | Published: 21 Jan 2025

TechTarget ComputerWeekly.com

CW Europe – June 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: This quarter in CW Europe we look at how momentum in the artificial intelligence industry in France might be slowed due to ethical questions.
Posted: 08 Feb 2021 | Published: 08 Jun 2017

TechTarget ComputerWeekly.com

GDPR: Risk, opportunity and what it means for security professionals
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.
Posted: 08 Feb 2021 | Published: 10 May 2018

TechTarget ComputerWeekly.com

Pervasive Data Profiler v4
sponsored by Pervasive Integration
PRODUCT DEMO: Pervasive Data Profiler™ ensures data quality. Proactively audit all types of data; automate testing against changing business data quality needs and compliance regulations. Get hyper-fast, multithreaded processing of large data sets or sample data
Posted: 11 Jan 2008 | Premiered: 11 Jan 2008

Pervasive Integration

The Massachusetts Data Protection Law
sponsored by TechTarget Security
EBOOK: Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
Posted: 18 Jun 2009 | Published: 18 Jun 2009

TechTarget Security

Meeting Compliance Objectives in SharePoint®
sponsored by AvePoint, Inc.
WHITE PAPER: This document is intended to aid IT administrators and other stakeholders responsible for managing SharePoint deployments, in planning and implementing a comprehensive, reliable, and efficient compliance strategy appropriate to their organizational needs.
Posted: 11 Jun 2009 | Published: 01 Feb 2009

AvePoint, Inc.

Total Economic Impact Of Oracle Enterprise Content Management Suite
sponsored by Oracle Corporation
WHITE PAPER: This whitepaper examines the financial impact and potential ROI on companies who use OracleEnterprise Content Management Suite. It provides companies with the ability to easily manage, reuse, and retain content and to streamline related business processes
Posted: 07 Aug 2008 | Published: 10 Jul 2008

Oracle Corporation

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos