TrueType Reports

Computer Weekly – 30 July 2024: CrowdStrike blue screen bug serves a stark warning
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we analyse the lessons from the global IT outage caused by the blue screen bug in CrowdStrike security software. We talk to the data chief of Barilla, the €4bn pasta maker, about the benefits of asking, "So what?" And we find out how Finland is taking a lead on quantum computing. Read the issue now.
Posted: 26 Jul 2024 | Published: 30 Jul 2024

TechTarget ComputerWeekly.com

CW Buyer's Guide to Emerging technology
sponsored by TechTarget ComputerWeekly.com
EBOOK: The way we work is changing with the exponential emergence of new technology. In this 15-page buyer's guide, Computer Weekly looks at the potential of DNA storage, how we can benefit from quantum computing in the future and the role of software in business development.
Posted: 13 Jan 2022 | Published: 13 Jan 2022

TechTarget ComputerWeekly.com

Application Delivery Network Buyers' Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.
Posted: 15 Mar 2021 | Published: 18 Feb 2021

TechTarget ComputerWeekly.com

Does a proprietary solution automatically mean vendor lock-in?
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: The dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?
Posted: 08 Feb 2021 | Published: 14 Mar 2016

TechTarget ComputerWeekly.com

CW ANZ: Taming the data beast
sponsored by TechTarget ComputerWeekly.com
EZINE: Software-defined storage (SDS), which promises greater transparency and control over data, is an increasingly important tool in the enterprise technology armoury. In this issue of CW ANZ, we look at how Australian enterprises are turning to SDS to improve data management and direct data to different tiers of storage or to applications.
Posted: 08 Feb 2021 | Published: 11 Oct 2018

TechTarget ComputerWeekly.com

Application security: More important than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 08 Feb 2021 | Published: 11 Jun 2018

TechTarget ComputerWeekly.com

Computer Weekly – 7 November 2017: The ethics of software development
sponsored by TechTarget ComputerWeekly.com
EZINE: Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.
Posted: 08 Feb 2021 | Published: 03 Nov 2017

TechTarget ComputerWeekly.com

5 steps for a smooth ECM implementation
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Before implementing Enterprise Content Management, it's important for organizations to develop an ECM roadmap or strategy to identify the top priorities and get clarity on the necessary procedures and technologies it entails. This infographic outlines the steps to successfully implement an ECM system.
Posted: 25 Oct 2022 | Published: 06 Oct 2022

TechTarget ComputerWeekly.com

CW Benelux - August-October 2022: Belgium seeks top tech talent
sponsored by TechTarget ComputerWeekly.com
EZINE: The battle for the right IT staff to transform businesses is changing and recruiters and job-seekers need to be clued up. In this issue, a Belgium-based recruiter gives the lowdown on tech job-seeking. Also read why Dutch beer brewer Heineken has replaced more than 60 different HR systems with SAP SuccessFactors as its central HR system.
Posted: 28 Jul 2022 | Published: 11 Aug 2022

TechTarget ComputerWeekly.com

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.