Addressable Advertising Opportunities for Network Operators
sponsored by Motorola Solutions
WHITE PAPER:
This paper provides an overview of advanced advertising opportunities and outlines Motorola's commitment to targeted video advertising.
Posted: 05 Jan 2009 | Published: 23 Dec 2008
|
|
|
Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER:
SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007
|
|
|
CW ANZ, November 2018: Exploring blockchain
sponsored by TechTarget ComputerWeekly.com
EZINE:
Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.
Posted: 08 Feb 2021 | Published: 07 Nov 2018
|
|
|
Build Your Agency’s Next Breakthrough
sponsored by FCN
WHITE PAPER:
Tap into this white paper to discover how you can balance business agility and dependable security with help from a partner.
Posted: 18 Jul 2023 | Published: 18 Jul 2023
|
|
|
Policing cyber crime
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
Posted: 08 Feb 2021 | Published: 23 Sep 2016
|
|
|
How LTE and 5G Solutions Support Modern Public Transportation Technologies
sponsored by Cradlepoint
WHITE PAPER:
Public transportation agencies are increasingly employing new technologies on buses, trollies, and ferries to improve both rider experience and operational efficiency. Tap into this white paper to learn how many agencies are connecting all these
Posted: 22 Sep 2022 | Published: 22 Sep 2022
|
|
|
Protect Federal Agencies by Securing DevOps, Secrets and Other Non-human Identities
sponsored by Merlin International
WHITE PAPER:
Securing non-human identities is crucial for federal agencies to prevent costly breaches and protect critical infrastructure. Learn how effective secrets management can enable secure DevSecOps and fulfill key cybersecurity directives. Read the full white paper.
Posted: 11 Oct 2024 | Published: 11 Oct 2024
|
|
|
How LTE and 5G Solutions Support Modern Public Transportation Technologies
sponsored by Cradlepoint
PRODUCT OVERVIEW:
To discover 6 key ways that LTE and 5G can benefit public transportation agencies, tap into this overview by Cradlepoint.
Posted: 28 Mar 2024 | Published: 28 Mar 2024
|
|
|
Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Nov 2018
|
|
|
Computer Weekly - 12 April 2022: Disney combines digital, data and creativity for ad opportunities
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to Disney Advertising Sales about how it is using data to subserve story-telling excellence. We delve into how rising energy costs negatively impacted the the UK arm of Sungard Availability Services. And we look at the role of infrastructure as code in edge datacentres. Read the issue now.
Posted: 08 Apr 2022 | Published: 12 Apr 2022
|
|
|
How Endpoint Privilege Management Fulfills Federal Mandates
sponsored by Merlin International
WHITE PAPER:
Endpoint privilege management is crucial for federal agencies to fulfill security mandates and defend against sophisticated cyberattacks. This whitepaper explores how CyberArk Endpoint Privilege Manager can help agencies meet Zero Trust requirements, prevent privilege escalation, and reduce ransomware risks. Read the whitepaper to learn more.
Posted: 11 Oct 2024 | Published: 11 Oct 2024
|
|
|
Achieve NYDFS Compliance
sponsored by Redjack
WHITE PAPER:
Recently, the New York State Department of Financial Services (NYDFS) introduced an update to its cybersecurity regulations, adding requirements to ensure against growing concerns. Download this white paper for a full breakdown of the new changes.
Posted: 28 Mar 2024 | Published: 28 Mar 2024
|
|
|
Databricks Lakehouse for ME eBook
sponsored by DataBricks
EBOOK:
In this e-book, you’ll discover how the Databricks Lakehouse for Media & Entertainment can help you drive more intelligent consumer and advertiser outcomes with data, analytics, and AI. Read on to find out how your organization can harness the full potential of your data.
Posted: 10 May 2024 | Published: 10 May 2024
|
|
|
Creating pathways to stability for immigrating children and families
sponsored by ICF
EBOOK:
Discover how ICF's expertise in child welfare, data science, and workforce optimization can help create pathways to stability for immigrating children and families. Learn best practices for inter-agency collaboration, data management, and training to support this vulnerable population. Read the e-book to learn more.
Posted: 03 Sep 2024 | Published: 30 Aug 2024
|
|
|
IT Priorities 2020: European IT budget share reflects home-working challenges brought by Covid
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
European organisations are being forced to redivert more limited budgets during the pandemic. This Eguide dives into the reasons as to how and why this shift is occurring in IT companies across the continent.
Posted: 08 Feb 2021 | Published: 16 Nov 2020
|
|
|
Shields up! Why Russia's war on Ukraine should matter to security pros
sponsored by TechTarget ComputerWeekly.com
EBOOK:
The build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.
Posted: 11 Mar 2022 | Published: 11 Mar 2022
|
|
|
Digital And Hybrid Event Platform In An ISO-Certified AWS Environment
sponsored by AllCloud
CASE STUDY:
VOK DAMS, an international communications agency for events and live marketing, needed a way to create a platform for hosting hybrid events with both digital and in-person participants. Check out this brief case study to explore the benefits of working with AWS and AllCloud to build a foundation for your business innovation needs.
Posted: 27 Jan 2022 | Published: 27 Jan 2022
|
|
|
Computer Weekly – 30 January 2024: Tech companies warn EU over encryption plans
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, tech companies are calling on the European Commission to rethink plans to weaken internet encryption – we explore the issues. We talk to credit rating agency Moody's about why it thinks now is the time to invest in quantum computing. Read the issue now.
Posted: 29 Jan 2024 | Published: 30 Jan 2024
|
|
|
Royal Holloway: Secure connected and autonomous vehicles - the long road ahead
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Advances in technology have led to safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
Posted: 08 Feb 2021 | Published: 14 Jul 2020
|
|
|
Accelerating Zero Trust Capabilities
sponsored by Saviynt
EBOOK:
The rapid growth of adversarial cyber threats emphasizes the need for the Department of Defense (DoD) to adapt and improve our deterrence strategies and cybersecurity implementations. In this whitepaper, Saviynt will hone in on the three specific pillars that require agencies to protect users, systems, and data at the identity layer.
Posted: 30 Apr 2024 | Published: 30 Apr 2024
|
|
|
Containers: Making security and business sense
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at why established security suppliers are finally adding containers to their repertoire, and how security pros must decide between trusted platform integration and the latest features from startups.
Posted: 08 Feb 2021 | Published: 21 Aug 2018
|
|
|
Computer Weekly – 10 April 2018: Technology is a lifesaver for NHS Blood and Transplant
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to the CDO of the NHS's blood and transplant agency about how digital transformation is proving to be a real lifesaver. Our latest buyer's guide examines the state of public cloud. And we find out how Ireland is gaining a Brexit dividend to boost its tech sector. Read the issue now.
Posted: 08 Feb 2021 | Published: 06 Apr 2018
|
|
|
Computer Weekly – 9 June 2020: How retailers are staying connected during their coronavirus shutdown
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at how the hard-hit retail sector has turned to technology to stay connected during the coronavirus lockdown. Our latest buyer's guide examines best practice in data quality. And we look at how remote working affects software development teams.
Posted: 08 Feb 2021 | Published: 09 Jun 2020
|
|
|
CW ANZ: Australian firms connect people in new ways
sponsored by TechTarget ComputerWeekly.com
EZINE:
Australian organisations such as BPay are turning to unified communications (UC) to create workplaces where employees operate in a flexible and open work environment. In this issue of CW ANZ, we look at how companies are approaching UC, the state of the market and what organisations need to do to be successful in rolling out UC tools.
Posted: 08 Feb 2021 | Published: 11 May 2018
|
|
|
Royal Holloway: Corporate under-reporting of cyber crime
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Without reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.
Posted: 26 May 2022 | Published: 26 May 2022
|
|
|
Zscaler ThreatLabz State of Encrypted Attacks Report
sponsored by Zscaler
RESEARCH CONTENT:
Encrypted attacks grew 24.3% year-over-year, with malware, ad spyware sites, and phishing making up 99% of threats. Education and government saw the largest increases. Learn how to defend against these evolving encrypted threats in the Zscaler ThreatLabz State of Encrypted Attacks Report.
Posted: 13 Aug 2024 | Published: 13 Aug 2024
|
|
|
Computer Weekly – 15 May 2018: Will government IT be ready for Brexit?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as the UK government struggles to get new IT systems up and running before Brexit, we examine the challenges ahead. We look at serverless computing and ask why this emerging cloud technology is so important. And we discuss the latest best practice in mobile strategy for SMEs. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 May 2018
|
|