Search Results for "CW Special Reportstart%3D20start=30start=20start=10start=30"
-
Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated
Sponsored by: TechTarget ComputerWeekly.comThis undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.
-
Computer Weekly – 31 May 2022: Trial and error – why the law on computer evidence must change
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the Post Office IT scandal highlighted the problem with computer evidence – we examine the need for legal reform. We assess the nuclear option for sustainable datacentre power. And we find out how IT experts can improve their soft skills and boost their career prospects as a result. Read the issue now.
-
The technological evolution of IT industry leaders: Part two
Sponsored by: TechTarget ComputerWeekly.comCompanies leading the technological evolution have gone through changes. This second part of this e-guide explores the technological evolution of SAP, Microsoft and some business analytics vendors throughout the past two decades.
-
CW Europe - March-May 2021: Nordic tech startups create blueprint for post-Covid working environment
Sponsored by: TechTarget ComputerWeekly.comBusiness can learn lessons from Nordic tech startups to prepare employees to return to the office after Covid restrictions end.
-
A Computer Weekly buyer's guide to edge datacentres
Sponsored by: TechTarget ComputerWeekly.comEdge datacentres seem set for a post-pandemic resurgence. In this 17-page buyer's guide, Computer Weekly looks at what makes them such an appealing option, the role infrastructure as code has to play and what's driving company adoption.
-
CW Middle East - Oct-Dec 2019: Saudi banks trial biometrics in ATMs
Sponsored by: TechTarget ComputerWeekly.comBiometric and blockchain technologies are being used in tandem to provide ID verification at Saudi Arabian cash machines.
-
Securing DevOps A Digital-first Imperative for Success
Sponsored by: CyberArkThis IDC InfoBrief commissioned by RedHat and CyberArk looks at the importance of securing identities as businesses embrace a DevOps culture in APAC. A full DevSecOps approach has many facets, and the starting point for a successful DevSecOps approach is around identity and access management controls.
-
Our Security, Delivered Your Way
Sponsored by: WatchGuard Technologies, Inc.Download this portfolio to learn more about WatchGuard's managed security service solutions, which give MSPs peace of mind through better endpoint management and comprehensive protection across your entire service ecosystem.
-
Top 10 business applications stories of 2018
Sponsored by: TechTarget ComputerWeekly.comThe steady modernisation of ERP systems, as they edge to the cloud and are complemented by new-generation customer software, was markedly evident this year. And blockchain and AI are making inroads. In this e-guide, Computer Weekly takes a look at the top 10 business applications of 2018.
-
Navigating The Paths Of Risk The State of Exposure Management in 2024
Sponsored by: XM CyberIn 2023, the XM Cyber Continuous Exposure Management (CEM) platform uncovered more than 40 million exposures. To access 7 key findings that these exposures illuminated, and to deepen your understanding of the state of exposure management in 2024, dig into this research report.