SEC Reports

Managing the Transition to International Financial Reporting Standards (IFRS)
sponsored by Oracle Corporation
WHITE PAPER: The white paper discusses what US organizations can do to prepare for International Financial Reporting Standards (IFRS), and focuses on what Oracle's Enterprise Performance Management solutions can do to help with top-end reporting.
Posted: 29 Jul 2009 | Published: 29 Jul 2009

Oracle Corporation

The New Age of Compliance: Preparing Your Organization for a New Era of Increased Accountability and Enforcement
sponsored by Mimosa Systems
WHITE PAPER: This white paper examines the current state of regulatory compliance and the impact of non-compliance. It also addresses the current political environment and the shift in the compliance landscape and compliance enforcement for which organizations need to be prepared. Finally, it discusses some best practices that can be applied to streamline..
Posted: 06 Jul 2009 | Published: 10 Jun 2009

Mimosa Systems

Buckle Up (On the Road to IFRS) Straight Talk Book Series
sponsored by Deloitte
WHITE PAPER: The 11th book in our Straight Talk series helps executives understand the implications of IFRS and their role in addressing the associated changes. The publication also offers practical suggestions to help companies navigate through pressing issues and developing your own conversion road map.
Posted: 29 Jul 2009 | Published: 29 Jul 2009

Deloitte

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Adobe Experience Manager
sponsored by AWS & Adobe
VIDEO: Adobe’s Experience Manager, powered by AWS, assists government agencies in connecting with residents on a more personal level and advancing their citizen-centric missions. Tune into this video to understand Experience Manager’s core capabilities.
Posted: 12 Jun 2024 | Premiered: 12 Jun 2024

AWS & Adobe

Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER: Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

Siperian, Inc.

Into the Future: The Fast Track for Financial Markets
sponsored by IBM Line of Business
WHITE PAPER: This paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
Posted: 17 Jun 2008 | Published: 01 Sep 2007

IBM Line of Business

Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER: When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007

IBM Software Group

Optimizing the PC Segment of California's IT Infrastructure
sponsored by Intel Corporation
CASE STUDY: Researchers found that by creating a dynamic IT environment- standardized, centralized, automated, and mobile-California can achieve a greener, more secure computing complex that improves productivity, delivering greater efficiency at a lower cost to taxpayers and the environment.
Posted: 27 May 2009 | Published: 27 May 2009

Intel Corporation

Why Traditional App Sec Testing Fails on Supply Chain Security
sponsored by ReversingLabs
WHITE PAPER: Learn why traditional application security testing tools alone leave your organization exposed to supply chain attacks — and how software supply chain security tools represent an evolution of traditional application security tools, ensuring end-to-end software security.
Posted: 12 Dec 2023 | Published: 13 Dec 2023

TOPICS:  .NET
ReversingLabs

How StrongDM Helps with AWS Well-Architected Framework
sponsored by StrongDM
PRODUCT OVERVIEW: The AWS Well-Architected framework helps cloud architects build a secure, high-performing, resilient, and efficient infrastructure for a variety of applications and workloads.
Posted: 08 Mar 2024 | Published: 08 Mar 2024

TOPICS:  .NET
StrongDM

Ransomware: Ongoing Challenges, and New Imperatives for IT and Business Leaders
sponsored by Panzura
WHITE PAPER: Ransomware continues to impact organizations of all sizes, with the average number of monthly attacks growing 75%. Download this white paper to unlock insight into the state of ransomware security.
Posted: 02 Apr 2024 | Published: 02 Apr 2024

TOPICS:  .NET
Panzura

2024 Talkdesk global contact center KPI benchmarking report
sponsored by Talkdesk
RESEARCH CONTENT: Today’s organizations are constantly looking for new ways that they can enhance their contact center processes in order to make operations more efficient. To do so, many have turned to generative AI and other automation tools. However, does this technology actually live up to the hype? Dig into this report.
Posted: 12 Jun 2024 | Published: 12 Jun 2024

TOPICS:  .NET
Talkdesk

The State of Software Supply Chain Security 2024
sponsored by ReversingLabs
RESEARCH CONTENT: Over the last 3 years, supply chain attacks rose 1300%. This report is designed to give readers a map with which they can navigate the landscape of software supply chain security, exploring some of the high-level trends in software supply chain threats and how recent attacks provide insight into what’s to come. Read on to learn more.
Posted: 22 Feb 2024 | Published: 22 Feb 2024

TOPICS:  .NET
ReversingLabs

Three Steps to Future-Proof Voice Compliance with Webex
sponsored by Theta Lake
WHITE PAPER: Learn how to simplify compliance with voice recording and archiving regulations for Webex. Theta Lake is designed to integrate seamlessly to help businesses capture, retain, and monitor Webex communications. Discover three best practices to future-proof your voice compliance. Read the white paper to learn more.
Posted: 27 Aug 2024 | Published: 27 Aug 2024

Theta Lake

A Move To High Speed Server Connectivity In The Cloud
sponsored by Panduit
WHITE PAPER: In this white paper, join Cisco and Panduit as they describe some of the trends in data center connectivity and the impact this compute-intensive workload have on cabling and network infrastructure design with corresponding deployment guidelines.
Posted: 14 Apr 2023 | Published: 14 Apr 2023

TOPICS:  .NET
Panduit

Quanttrading Datamanagement By The Numbers
sponsored by FD Technologies
EBOOK: This ebook explores how quantitative trading data management has evolved, from high-frequency ingestion to time-series analysis and streaming analytics. Inside, you'll learn how a purpose-built data platform can boost productivity and innovation. Download the ebook now to discover 7 innovative trading applications and best practices.
Posted: 26 Sep 2024 | Published: 27 Sep 2024

All resources sponsored by FD Technologies

ThreatLabz Ransomware Report
sponsored by Zscaler
RESEARCH CONTENT: This in-depth ransomware report from Zscaler ThreatLabz analyzes the latest trends, including record-high ransom payments, the most targeted industries, and effective defense strategies. Download the report to stay ahead of evolving ransomware threats.
Posted: 13 Aug 2024 | Published: 13 Aug 2024

Zscaler

Three Best Practice Tips for Zoom Phone & Contact Center
sponsored by Theta Lake
WHITE PAPER: Ensure compliance in voice communications with Zoom Phone and Contact Center. This white paper explores best practices to navigate the evolving compliance landscape, including how to capture and archive all communications, unify searchable archiving, and leverage AI-powered risk detection. Read the full white paper to learn more.
Posted: 27 Aug 2024 | Published: 27 Aug 2024

Theta Lake

Anatomy Of Identity Based Attacks
sponsored by Okta
WHITE PAPER: 74% of all breaches involve some form of human factor, whether it be error, credential theft, or social engineering. This white paper looks at the growing threats impacting organizations today, and how Okta can play a role in threat protection, detection, and response, before, during, and after the point of authentication.Read on to learn more.
Posted: 12 Apr 2024 | Published: 13 Apr 2024

TOPICS:  .NET
Okta

A Deep Dive into Shadow IT: Examples, Risks, and Solutions
sponsored by Auvik Networks, Inc.
WHITE PAPER: Shadow IT threatens data security and compliance. In this white paper, discover examples like unapproved comms tools or personal devices, and learn how to tackle shadow IT risks and solutions.
Posted: 12 Dec 2023 | Published: 13 Dec 2023

TOPICS:  .NET
Auvik Networks, Inc.

Best Practices: Three Tips to Keep RingCentral Voice Communications Compliant Now and in the Future
sponsored by Theta Lake
WHITE PAPER: As regulatory oversight increases, organizations struggle to adopt cloud unified communications (UC) systems while maintaining compliance. Discover how Theta Lake and RingCentral can help you capture, archive, and manage voice communications to ensure compliance and mitigate risks. Read the white paper to learn more.
Posted: 27 Aug 2024 | Published: 27 Aug 2024

Theta Lake

GEP Outlook 2024
sponsored by GEP
RESEARCH CONTENT: Recent years have had businesses struggling with a myriad of challenges, risks, and concerns, especially for procurement and supply chain leaders. So, how are companies transforming? What trends can you expect going into the new year and how can you best keep up? Browse the report to learn more.
Posted: 13 Feb 2024 | Published: 13 Feb 2024

TOPICS:  .NET
GEP

Web security: Important but often overlooked
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 08 Feb 2021 | Published: 24 Nov 2017

TechTarget ComputerWeekly.com

Improving Splunk Performance and Lowering CPU Usage with Cribl Stream
sponsored by Cribl.io
WHITE PAPER: Splunk was first designed for search-time analytics – so if you need to report on massive amounts of data, performance can suffer. Enter Stream: a data pipeline solution that transforms unstructured data to be more structured before it persists to disk. Read on to learn how you can leverage Stream to improve Splunk performance and lower CPU usage.
Posted: 10 Feb 2024 | Published: 10 Feb 2024

TOPICS:  .NET
Cribl.io

Computer Weekly – 10 April 2018: Technology is a lifesaver for NHS Blood and Transplant
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the CDO of the NHS's blood and transplant agency about how digital transformation is proving to be a real lifesaver. Our latest buyer's guide examines the state of public cloud. And we find out how Ireland is gaining a Brexit dividend to boost its tech sector. Read the issue now.
Posted: 08 Feb 2021 | Published: 06 Apr 2018

TechTarget ComputerWeekly.com

4 ChatGPT cybersecurity benefits for the enterprise
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As the technology matures and improves, expect to see the following beneficial ChatGPT cybersecurity use cases emerge in the enterprise.
Posted: 24 Mar 2023 | Published: 24 Mar 2023

TechTarget ComputerWeekly.com

Zero Trust + AI Secure and Optimize Your Organization
sponsored by Zscaler
WHITE PAPER: Zero Trust architecture combined with AI helps organizations address rising cyber risk and competitive pressures. Learn how Zscaler's solutions can secure and optimize your organization in this informative white paper.
Posted: 13 Aug 2024 | Published: 13 Aug 2024

Zscaler

Computer Weekly - 5 May 2020: The role of AI in the war against pandemics
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how AI and data science are supporting the global push to deal with the coronavirus pandemic. We reveal, and talk to, the man behind the world's first computer virus pandemic, the Love Bug. And we examine how the IT services market will change as a result of the current crisis. Read the issue now.
Posted: 08 Feb 2021 | Published: 05 May 2020

TechTarget ComputerWeekly.com

Recommended Inventory for Data Center Scope 3 GHG Emissions Reporting
sponsored by Schneider Electric
WHITE PAPER: In this paper, find out everything you need to know about Scope 3 emissions, and explore an inventory of 9 emissions source categories and their data center-specific subcategories for accounting and reporting.
Posted: 16 May 2024 | Published: 16 May 2024

TOPICS:  .NET
Schneider Electric

Recommended Inventory for Data Center Scope 3 GHG Emissions Reporting
sponsored by Schneider Electric
WHITE PAPER: In this paper, explore the FAQs of Scope 3 emissions and discover the inventory of 9 emissions source categories and their data center-specific subcategories for accounting and reporting.
Posted: 19 Mar 2024 | Published: 19 Mar 2024

TOPICS:  .NET
Schneider Electric

The Ciso’s Guide To The Roi Of Cybersecurity
sponsored by Arkose Labs
EBOOK: Facing increased scrutiny and cyberthreats, CISOs can explore 5 ways to show bot management ROI in this e-book. Learn to quantify savings from less downtime, breaches, reputational harm, and revenue loss. Download to justify investing in modern bot management.
Posted: 16 Jul 2024 | Published: 16 Jul 2024

Arkose Labs

A Computer Weekly buyer's guide to on-site, off-site and cloud-based disaster recovery
sponsored by TechTarget ComputerWeekly.com
EGUIDE: With businesses becoming increasingly dependent on data to function, being able to recover quickly from an IT systems failure is critical. In this 14-page buyer's guide, Computer Weekly looks at the various options available when implementing disaster recovery.
Posted: 08 Feb 2021 | Published: 18 Feb 2020

TechTarget ComputerWeekly.com

Cyber security in the Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.
Posted: 08 Feb 2021 | Published: 11 Apr 2017

TechTarget ComputerWeekly.com