Handheld Electronic Games Reports

Strategy for Securing Mobile Content - 5 Key Guidelines
sponsored by Accellion, Inc.
WHITE PAPER: Inside, you'll find 5 guidelines that every organization should follow for comprehensive mobile security.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

Accellion, Inc.

CW ASEAN: Unlock flash opportunities
sponsored by TechTarget ComputerWeekly.com
EZINE: Traditional disks can no longer keep up with the needs of modern enterprises. In this issue of CW ASEAN, we take a look at how enterprises are taking to all-flash array storage, and what they need to do to lay the foundation necessary for getting the most out of the technology. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Oct 2018

TechTarget ComputerWeekly.com

API Management: The role of APis in digital business transformation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.
Posted: 08 Feb 2021 | Published: 09 Nov 2020

TechTarget ComputerWeekly.com

CW500: A roadmap to software-defined everything – Morgan Stanley
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything – this presentation was given by Rob White, executive director of the global database group at Morgan Stanley.
Posted: 08 Feb 2021 | Published: 14 Oct 2016

TechTarget ComputerWeekly.com

Infographic: 2019 IT Priorities - Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic, we shine a light on our 2019 IT Priorities survey results. Discover what IT departments are investing in and how much budgets are increasing by. Taken from a study of 151 respondents from across Middle East.
Posted: 08 Feb 2021 | Published: 09 Jul 2019

TechTarget ComputerWeekly.com

Computer Weekly – 8 November 2016: The march of the robot workers
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.
Posted: 08 Feb 2021 | Published: 08 Nov 2016

TechTarget ComputerWeekly.com

Computer Weekly – 18 June 2019: Applying AI to road safety
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit a Tokyo project where artificial intelligence is helping to improve road safety by detecting potential subsidence. As bug bounty programmes become popular, we look at what's involved and the pitfalls to beware. And we discuss digital development in healthcare with NHS England. Read the issue now.
Posted: 08 Feb 2021 | Published: 18 Jun 2019

TechTarget ComputerWeekly.com

AI & Automation: Turning data into insights
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the trends that are shaping the demand for AI and how organizations including healthcare service providers and F1 racing teams are leveraging technology on their own terms.
Posted: 08 Feb 2021 | Published: 11 Jul 2018

TechTarget ComputerWeekly.com

CW Nordics November 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The Nordic countries are pace-setters when it comes to digital transformation and although there is a wealth of IT talent in the region, it seems it is not enough.
Posted: 08 Feb 2021 | Published: 23 Nov 2017

TechTarget ComputerWeekly.com

Secure DevOps Brings Better, Faster, Safer Software
sponsored by TechTarget Security
EBOOK: In the rush to implement DevOps, security is too often overlooked. But DevSecOps is essential in these hack-filled days. Learn how you can add security to software development today.
Posted: 03 May 2019 | Published: 03 May 2019

TechTarget Security