IT Audits Reports

Computer Weekly – 25 August 2020: When algorithms don't play fair
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we report on the auditing of algorithms to countervail bias. We examine what CISOs can learn from Covid-19. And we assess how competent AI is at building applications that deliver the best possible customer experience, in our buyer's guide to modern software development. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Aug 2020

TechTarget ComputerWeekly.com

Computer Weekly – 8 November 2016: The march of the robot workers
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.
Posted: 07 Nov 2016 | Published: 08 Nov 2016

TechTarget ComputerWeekly.com

Making the business case for quantum computing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Tech startups, investors, major suppliers and even leading-edge companies are already placing a bet on the future of quantum computing. In this e-guide, we hear from experts in the tech sector, business consultancies and international corporations as they examine the potential of quantum computing.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

TechTarget ComputerWeekly.com

Quantum computing in action
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we look at Finland and how state investment is being used in a milestone project involving public and private sector organisations to understand the applications of the technology. And we hear how Spanish bank BBVA is examining the complex financial problems that could be solved by quantum computing.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

TechTarget ComputerWeekly.com

Webinar: Getting Hadoop Through an IT Audit
sponsored by WANdisco
WEBCAST: Join this webinar from GigaOM Research and WANdisco to learn how enterprises are hardening Hadoop across global data centers to ensure continuous availability, even during maintenance windows.
Posted: 08 May 2014 | Premiered: May 8, 2014

WANdisco

Guide: Active Administrator
sponsored by ScriptLogic Corporation
WHITE PAPER: Active Directory becomes very complex to manage in Windows networks. Administrators leave, users are given elevated privileges, applications require special accounts - very soon you have an Active Directory full of security weaknesses.
Posted: 28 Aug 2009 | Published: 20 Jul 2009

ScriptLogic Corporation

Your Guide to Improving IT Service Visibility
sponsored by Pangea Systems
WHITE PAPER: This whitepaper details the importance of IT service visibility for providing the performance your users demand and justifying the value of your services.
Posted: 25 Jun 2014 | Published: 20 Mar 2014

Pangea Systems

IR35 reforms: Confusion over who pays employers’ NI leaves IT contractors out of pocket
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Litigators are circling as thousands of contractors realise that the 2017 roll-out of IR35 reforms to the public sector may have resulted in unlawful tax deductions – and the private sector could be next.
Posted: 27 Aug 2021 | Published: 26 Aug 2021

TechTarget ComputerWeekly.com

Presentation Transcript: Managing Windows with IT Search
sponsored by Splunk
PRESENTATION TRANSCRIPT: Read this presentation transcript of the “Managing Windows with IT Search” podcast with Windows Specialist and Director of Product Management at Splunk, Johnathon Cervelli, to learn how IT Search can help you dramatically simplify Windows Systems Management.
Posted: 01 Apr 2009 | Published: 01 Apr 2009

Splunk

Lumension Endpoint Protection - Whitelisting Technology Improves Security, Reliability, and Performance via Trusted Change
sponsored by Lumension
WHITE PAPER: Learn how whitelisting guards your systems by allowing only approved processes and applications to run on the endpoint and preventing malware and viral programs. With whitelisting technology, you can improve total data security and overall system performance.
Posted: 12 Aug 2009 | Published: 01 Sep 2008

Lumension