Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER:
The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005
|
|
|
Focus: Health IT
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
At a time when the NHS is faced with unprecedented pressure, new technological solutions can help ease some of the strain. From apps to electronic records and artificial intelligence, technology is playing an increasingly important part in transforming the health service.
Posted: 08 Feb 2021 | Published: 01 Sep 2017
|
|
|
A Computer Weekly buyer's guide to asset management for hybrid IT
sponsored by Livingstone Group
EGUIDE:
Hybrid IT opens up a range of new considerations for businesses. In this 14-page buyer's guide, Computer Weekly looks at how to manage its infrastructure, the importance of cost management and the main considerations to make when addressing cloud management issues.
Posted: 08 Feb 2021 | Published: 25 Mar 2019
|
|
|
Making the case for cloud-based security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
Posted: 08 Feb 2021 | Published: 04 Jan 2021
|
|
|
Making the case for cloud-based security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
Posted: 08 Feb 2021 | Published: 07 Jul 2020
|
|
|
Major US Online Gaming Company Mitigates Sophisticated DDoS Attack with Comcast Business
sponsored by Comcast Business
CASE STUDY:
A major US online gaming company faced a sophisticated DDoS attack with peak traffic of 400 Gbps. Comcast Business' Emergency DDoS Mitigation Service rapidly responded with customized countermeasures. Within 72 hours, the company regained control, avoiding significant revenue losses and reputational damage. Read the case study to learn more.
Posted: 01 Mar 2025 | Published: 01 Mar 2025
|
|
|
Tech career guide: Cyber security
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, Computer Weekly looks at what it takes to make it in Asia-Pacific's cyber security industry.
Posted: 23 Jun 2022 | Published: 23 Jun 2022
|
|
|
Essential Guide: APAC women in cyber security
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
In Asia-Pacific, men continue to outnumber women in the growing field of cyber security - even as more women are entering the industry. The lack of awareness of the profession among students and unconscious biases in hiring processes are just some of the challenges that we must overcome before we can see more women in the profession.
Posted: 04 Oct 2021 | Published: 04 Oct 2021
|
|
|
UCaaS Buyers’ Checklist
sponsored by 8x8
PRODUCT OVERVIEW:
The best unified communications as a service (UCaaS) tools offer a range of transformative capabilities, from personalized meeting rooms to built-in security and encryption. Use this checklist to benchmark the most important features against your organization’s UCaaS requirements.
Posted: 31 May 2024 | Published: 31 May 2024
|
|
|
Top Healthcare Cybersecurity Predictions For 2024
sponsored by XtelligentMedia Healthcare
EGUIDE:
Industry experts predicted a focus on AI and supply chain security as ransomware threats continue to threaten healthcare cybersecurity in 2024.
Posted: 14 Feb 2024 | Published: 15 Feb 2024
|
|
|
Top Healthcare Cybersecurity Predictions For 2024
sponsored by XtelligentMedia Healthcare
EGUIDE:
Industry experts predicted a focus on AI and supply chain security as ransomware threats continue to threaten healthcare cybersecurity in 2024. Read more about it in this eGuide.
Posted: 12 Feb 2024 | Published: 12 Feb 2024
|
|
|
Cloud: A security risk and opportunity
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
With businesses around the world adopting cloud-based services at an ever-increasing pace, security is now more important than ever. We look at why European cloud adopters are dissatisfied with their cloud providers' security and how providers are focusing on security in the design phase of products and introducing new security mechanisms.
Posted: 08 Feb 2021 | Published: 15 Jan 2018
|
|
|
The Cloud Influence on GRC
sponsored by TechTarget Security
EBOOK:
Cloud computing risk management, governance and compliance processes are evolving as organizations increasing turn to hosted services. Learn how in our SearchCompliance handbook.
Posted: 19 Sep 2024 | Published: 23 Apr 2014
|
|
|
Renewable Energy Solutions Brochure
sponsored by Panduit
PRODUCT OVERVIEW:
As solar and other renewable energy sources continue to gain in popularity and usage, it has led to an increase in renewable energy production facilities around the world. With this rise in production, one partner in particular has found a way to partner with both EPC’s and solar installers to help power the world. Read on to learn more about it.
Posted: 27 Jun 2023 | Published: 27 Jun 2023
|
|
|
Computer Weekly – 25 June 2024: A revolution in space
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to astronaut Tim Peake about the imminent revolution in space tech and what it means for IT leaders. AI is set to transform the movie industry – we hear what it means for the producers of the latest Mad Max film. And we find out about plans for Saudi Arabian smart city Neom. Read the issue now.
Posted: 24 Jun 2024 | Published: 25 Jun 2024
|
|
|
How Audit Compliance and Cloud Adoption Affects IT Security
sponsored by Dell Software
EGUIDE:
Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.
Posted: 08 Feb 2021 | Published: 06 Oct 2016
|
|
|
Top 4 market forces impacting the cybersecurity strategies of software companies and investors
sponsored by Amazon Web Services
WHITE PAPER:
There are a number of shifts affecting how cybersecurity providers and investors are approaching the market, impacting what they invest in and what they bring to market to try to mitigate the threats of today and tomorrow.These shifts can be loosely grouped into four categories. Download this whitepaper to see what they are and how AWS can help.
Posted: 12 Dec 2024 | Published: 06 Jan 2025
|
|
|
Top 4 market forces impacting the cybersecurity strategies of software companies and investors
sponsored by AWS
EGUIDE:
There are a number of shifts affecting how cybersecurity providers and investors are approaching the market, impacting what they invest in and what they bring to market to try to mitigate the threats of today and tomorrow.These shifts can be loosely grouped into four categories. Download this whitepaper to see what they are and how AWS can help.
Posted: 23 Dec 2024 | Published: 23 Dec 2024
|
|
|
A Computer Weekly buyer's guide to Threat Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
Posted: 08 Feb 2021 | Published: 05 Apr 2019
|
|
|
CW APAC buyer's guide to cloud security
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products.
Posted: 08 Feb 2021 | Published: 07 Mar 2019
|
|
|
Enterprise cloud applications – can we trust them?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
Posted: 08 Feb 2021 | Published: 27 Jul 2016
|
|
|
Protect your attack surface
sponsored by Cloudflare
EBOOK:
As organizations expand digitally, they face new cybersecurity challenges. This e-book explores "Everywhere Security," a comprehensive approach to protect the attack surface across employees, applications, APIs, and networks. Learn strategies to minimize vulnerabilities, prevent compromise, and stop data exfiltration. Boost your security posture.
Posted: 11 Mar 2025 | Published: 11 Mar 2025
|
|
|
Protect Your Attack Surface
sponsored by Cloudflare
EBOOK:
Explore "Everywhere Security" in our e-book to protect users, apps, and networks as the corporate perimeter fades. Learn to minimize the attack surface, prevent breaches, block lateral movement, and halt data theft. Secure your organization—read the full e-book.
Posted: 13 Jul 2024 | Published: 13 Jul 2024
|
|
|
Computer Weekly – 30 January 2024: Tech companies warn EU over encryption plans
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, tech companies are calling on the European Commission to rethink plans to weaken internet encryption – we explore the issues. We talk to credit rating agency Moody's about why it thinks now is the time to invest in quantum computing. Read the issue now.
Posted: 29 Jan 2024 | Published: 30 Jan 2024
|
|
|
How To Choose The Right CX Delivery Partner In An Age Of Rising Cyber Threats
sponsored by Foundever
EBOOK:
Secure your customer experience with the right BPO partner. This guide explores how to identify genuine security best practices, mitigate risks, and maximize rewards. Read the full white paper to learn how to choose the right CX delivery partner in an age of rising cyber threats.
Posted: 13 Sep 2024 | Published: 18 Sep 2024
|
|
|
Outside Plant Broadband Construction Solutions
sponsored by Panduit
PRODUCT OVERVIEW:
Panduit's Outside Plant Broadband Solutions support fiber network deployment with 50+ years of expertise. The lineup includes bundling tools, harsh environment ID, grounding components, enclosures, stainless steel mounts, and optical fiber products, all designed for reliable outdoor performance. Discover tools that enhance installation efficiency.
Posted: 18 Mar 2025 | Published: 18 Mar 2025
|
|