S. 877

S. 877 Reports
Declaration by David Godkin producing 212 sealed exhibits - 16 May 2018
sponsored by ComputerWeekly.com
RESOURCE: The exhibits produced in this declaration by David Godkin, counsel for app developer Six4Three, contain internal Facebook communications, including emails between CEO Mark Zuckerberg and senior executives, correspondence and chat-logs, spreadsheets and strategy presentations.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

ComputerWeekly.com

Billion Dollar Blindness
sponsored by TechTarget
WEBCAST: Access this webcast to learn how using the latest intent data and AI-driven technologies can transform their productivity and yields from a market, an ICP, or a set of named ABM accounts.
Posted: 26 Feb 2020 | Premiered: Feb 19, 2020

TechTarget

Europe's controversial digital vision for the next decade
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the European Parliament's digital vision for the next decade, including controversial plans for a regional internet. GDPR is two years old – we find out how well the law is working. And we look at how the coronavirus crisis is affecting digital skills recruitment and training.
Posted: 08 Feb 2021 | Published: 16 Jun 2020

ComputerWeekly.com

CW ASEAN: European data law - be aware and prepare
sponsored by ComputerWeekly.com
EZINE: Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

ComputerWeekly.com

Computer Weekly - 1 March 2022: Post Office Horizon scandal enters public conscience - at last
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, 13 years after Computer Weekly first reported on flaws in the Post Office IT system, a public inquiry finally allows victims to reveal the devastating impact on their lives. Enterprises are starting to evaluate the uses of 5G. And we look at how SMEs have turned to e-commerce after the pandemic. Read the issue now.
Posted: 01 Mar 2022 | Published: 01 Mar 2022

ComputerWeekly.com

Better Healthcare Starts with Better Information
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper examines Dell's holistic solutions, bringing together implementation services, process improvement consulting and customized IT technology so caregivers have better information for better patient care.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

DellEMC and Intel®

Becoming a Social Business: The IBM Story
sponsored by IBM
WHITE PAPER: In this white paper, IDC explores example case studies of IBM’s internal evolution to a social business as a means to guide other large organisations considering making a similar transition.
Posted: 23 Jun 2011 | Published: 22 Jun 2011

IBM

Evolution Vs. Revolution: Driving B2B Efficiencies Forward with People, Processes and Technology Tools
sponsored by SEEBURGER
WHITE PAPER: B2B integration technology, offers powerful and complementary tools and services for seamless business integration and meeting the challenges of global collaboration.
Posted: 27 Oct 2008 | Published: 27 Oct 2008

SEEBURGER

CW Europe – September Edition
sponsored by ComputerWeekly.com
EZINE: In this issue of CW Europe read how data discipline ensures you avoid data loss, as well as helping you to think clearer and to be organised.
Posted: 04 Sep 2013 | Published: 04 Sep 2013

ComputerWeekly.com

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act
sponsored by Information Security Magazine
EZINE: This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

Information Security Magazine