Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER:
The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005
|
|
|
Kaspersky Cloud Workload Security
sponsored by Kaspersky
WHITE PAPER:
Kaspersky Cloud Workload Security is a comprehensive solution that secures cloud workloads across hybrid and multi-cloud environments. It offers multi-layered protection, resource-efficient performance, and compliance support to address the unique security challenges of cloud migration. Read the full white paper to learn more.
Posted: 23 Dec 2024 | Published: 21 Dec 2024
|
|
|
Converged infrastructure fundamentals
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive. The day of converged infrastructures has arrived.
Posted: 08 Feb 2021 | Published: 04 Jan 2021
|
|
|
Why you need convergence
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
You need convergence today more ever. Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive.
Posted: 08 Feb 2021 | Published: 10 Jul 2020
|
|
|
Converged infrastructure fundamentals
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive. The day of converged infrastructures has arrived.
Posted: 08 Feb 2021 | Published: 06 Jul 2020
|
|
|
The Definitive Guide To Container Security
sponsored by Palo Alto Networks
EBOOK:
Securing container environments requires understanding tools and policies for protecting infrastructure, applications, and components. This guide explores container security across the lifecycle, from build to runtime, and offers a roadmap to prepare your environment and secure your containers. Read the full e-book to learn more.
Posted: 10 Dec 2024 | Published: 11 Dec 2024
|
|
|
Computer Weekly – 23 May 2017: Global ransomware attack could be a security wake-up call
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at the global WannaCry ransomware attack that spread over 150 countries – will it be the wake-up call to take cyber security seriously? Also, find out how Moscow is leading the way in smart city digitisation. And our latest buyer's guide examines customer experience management.
Posted: 08 Feb 2021 | Published: 23 May 2017
|
|
|
Computer Weekly Buyer's Guide to services for digitisation and IoT
sponsored by TechTarget ComputerWeekly.com
EBOOK:
In this 13-page buyer's guide, Computer Weekly looksat the use of mid-sized nearshore IT service providers, choosing a cloud-based platform, and how to manage the huge volume of IoT data.
Posted: 08 Feb 2021 | Published: 13 Dec 2017
|
|
|
Containerized Deployments On Amazon Web Services
sponsored by TIBCO
DATA SHEET:
Preparing your organization for the cloud requires a level of security and agility that some enterprises find difficult to maintain. Check out this data sheet to examine how your enterprise can safely and swiftly launch into the cloud leveraging containerized deployments on Amazon Web Services (AWS).
Posted: 09 Jun 2022 | Published: 10 Jun 2022
|
|
|
A Critical Business System Evolved for the Future
sponsored by LzLabs
CASE STUDY:
A North American telecom company successfully transitioned a critical business application from a legacy mainframe to a modern private cloud using the LzLabs Software Defined Mainframe. This case study highlights their annual operational cost savings, improved scalability, and enhanced security. Read the full case study now to learn more.
Posted: 22 Aug 2024 | Published: 22 Aug 2024
|
|
|
Top Patient Engagement Technology for Remote Management of Chronic Disease
sponsored by XtelligentMedia Healthcare
EGUIDE:
Telehealth, remote patient monitoring, and patient-facing solutions like apps and the patient portal are essential to remote chronic disease management.
Posted: 17 Jul 2024 | Published: 17 Jul 2024
|
|
|
Computer Weekly – 30 April 2019: Inside Huawei
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we visit the new campus of Chinese networking supplier Huawei, to find out what the firm thinks of the controversy raging about the security of its products. Our latest buyer's guide examines storage optimisation technologies. And we look at the latest developments for technology in schools. Read the issue now.
Posted: 08 Feb 2021 | Published: 30 Apr 2019
|
|
|
Why implementing multiple carriers doesn’t achieve true network diversity
sponsored by Sinch
WHITE PAPER:
Network diversity is crucial for business continuity, but using multiple carriers doesn't always achieve true diversity. Learn how a single carrier with robust network architecture can provide reliable, redundant communications to keep your business connected. Read the full white paper to discover Sinch's approach to network diversity.
Posted: 03 Nov 2024 | Published: 04 Nov 2024
|
|
|
Taming the Microservices, Containers, and Governance Beast
sponsored by Apcera
EGUIDE:
What if there's an easy way to reduce overhead and adapt governance for modern app architectures? In this expert e-guide, explore a distributed, microservices-based approach to governance and learn how to adapt IT for microservices and containers with automation tools.
Posted: 08 Feb 2021 | Published: 28 Apr 2017
|
All resources sponsored by Apcera
|
|
CW Nordics November 2017
sponsored by TechTarget ComputerWeekly.com
EZINE:
The Nordic countries are pace-setters when it comes to digital transformation and although there is a wealth of IT talent in the region, it seems it is not enough.
Posted: 08 Feb 2021 | Published: 23 Nov 2017
|
|
|
Computer Weekly – 27 September 2022: Making digital a key ingredient at Mondelez
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to snack giant Mondelez, the owner of Cadbury, about how AI and data are transforming its business. SAP is increasing support costs for the first time in years – we assess the impact on customers. And a Ukrainian tech CEO tells us how his company kept going despite the Russian invasion. Read the issue now.
Posted: 23 Sep 2022 | Published: 27 Sep 2022
|
|
|
Accelerating Wireless-Wireline Network Convergence
sponsored by American Tower
EBOOK:
This e-book explores how wireless-wireline network convergence can enable the metaverse, Omniverse, and future digital infrastructure. Inside, you'll learn how data centers, towers, and edge computing can work together to deliver low-latency, high-capacity services. Read the e-book now to learn more.
Posted: 15 Aug 2024 | Published: 15 Aug 2024
|
|
|
Data Security and Privacy White Paper
sponsored by Luware
WHITE PAPER:
Explore Luware's comprehensive data security and privacy framework for its cloud-based Nimbus platform. Learn how Luware leverages Microsoft Azure's security controls and implements robust authentication, access management, and business continuity measures to protect customer data. Read the full white paper to learn more.
Posted: 29 Jan 2025 | Published: 29 Jan 2025
|
|
|
Panda Adaptive Defense 360 Technologies
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER:
In an era of sophisticated ransomware and increasingly frequent cyberattacks, MSPs need to make sure they have comprehensive security capabilities. Access this white paper to learn how Panda Adaptive Defense 360 offers a full protection stack including endpoint protection technology, zero-trust defense, and contextualized behavior detection.
Posted: 21 Jul 2021 | Published: 21 Jul 2021
|
|
|
2024 Cyber Security Report
sponsored by Checkpoint Software Technologies
RESEARCH CONTENT:
In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.
Posted: 03 May 2024 | Published: 04 May 2024
|
|
|
Top 10 cyber crime stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.
Posted: 10 Sep 2021 | Published: 27 Dec 2019
|
|
|
Computer Weekly – 16 May 2017: Political turmoil threatens global IT services sector
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the threats to the global IT services sector caused by the political turmoil in the US and UK. Home Office IT chief Sarah Wilkinson discusses digital transformation in a large government department. And we find out how business leaders need to improve their digital skills. Read the issue now.
Posted: 08 Feb 2021 | Published: 16 May 2017
|
|
|
CISO Report Emerging trends
sponsored by Splunk
EBOOK:
CISOs and their boards are working more closely than ever. But their backgrounds are worlds apart, leading to gaps in priorities, goals, and success metrics. Learn how CISOs and boards can bridge the divide and build stronger, more productive relationships.
Posted: 20 Feb 2025 | Published: 20 Feb 2025
|
|
|
9 Ways Your Aging Phone System Is Putting Business Success On Hold
sponsored by Intermedia.Net
WHITE PAPER:
Explore 9 ways an aging phone system can put your business success on hold. Learn how a cloud-based phone system can provide reliable connectivity, advanced features, and mobile capabilities to meet the needs of today's impatient customers and mobile workforce. Read the full white paper to discover how to modernize your business communications.
Posted: 17 Jan 2025 | Published: 17 Jan 2025
|
|
|
CW Benelux - February-April 2022: Unesco members adopt AI ethics recommendation
sponsored by TechTarget ComputerWeekly.com
EZINE:
Unesco member state have adopted an AI ethics recommendation that seeks to define a common set of values and principles to guide the development of ethical AI globally. Also read about a large-scale national cyber exercise in the Netherlands.
Posted: 26 Jan 2022 | Published: 10 Feb 2022
|
|
|
Focus: Network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 08 Feb 2021 | Published: 24 Apr 2017
|
|