Next stage of virtualisation: Containers
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The buzz and hype surrounding container technologies has reached fever pitch in recent years, prompting CIOs and IT decision makers to mull over what role, if any, they should and could play in their digital transformation plans.
Posted: 08 Feb 2021 | Published: 03 Apr 2017
|
|
|
Computer Weekly - 29 November 2022: How to stop data retention from killing the planet
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.
Posted: 28 Nov 2022 | Published: 29 Nov 2022
|
|
|
Raspberry PI with Java: programming the internet of things
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
Posted: 08 Feb 2021 | Published: 27 Sep 2016
|
|
|
CW Benelux - August-October 2022: Belgium seeks top tech talent
sponsored by TechTarget ComputerWeekly.com
EZINE:
The battle for the right IT staff to transform businesses is changing and recruiters and job-seekers need to be clued up. In this issue, a Belgium-based recruiter gives the lowdown on tech job-seeking. Also read why Dutch beer brewer Heineken has replaced more than 60 different HR systems with SAP SuccessFactors as its central HR system.
Posted: 28 Jul 2022 | Published: 11 Aug 2022
|
|
|
Computer Weekly - 20 December 2022: The Post Office IT scandal - cock-up or cover-up?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the Post Office IT scandal inquiry continues to reveal shocking details – we review the latest evidence. We examine progress of the roll-out of fast broadband across the UK. And as the Online Safety Bill returns to Parliament, we look at the arguments about how to keep the internet safe. Read the issue now.
Posted: 16 Dec 2022 | Published: 20 Dec 2022
|
|
|
A Computer Weekly Buyer's Guide to Mobile App Development
sponsored by TechTarget ComputerWeekly.com
EZINE:
This Computer Weekly buyer's guide looks at how to take an Agile approach to mobile app development. Discover how to gain a competitive edge by accelerating mobile development, turning mobile users' expectations to your advantage, and building unique, differentiated mobile experiences.
Posted: 08 Feb 2021 | Published: 21 Mar 2017
|
|
|
Computer Weekly - 15 March 2022: How the tech sector is supporting Ukraine
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.
Posted: 14 Mar 2022 | Published: 15 Mar 2022
|
|
|
Computer Weekly@50: What was happening in July
sponsored by TechTarget ComputerWeekly.com
EBOOK:
The National Museum of Computing has again been looking into Computer Weekly's 50 years of magazine issues for another selection of articles highlighting significant news published in the month of July over the past five decades.
Posted: 08 Feb 2021 | Published: 19 Jul 2016
|
|
|
Security Threat Report: July 2008
sponsored by Sophos
WHITE PAPER:
This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008
|
|
|
The Complete Network Assessment
sponsored by Dorado Software
WHITE PAPER:
This paper gives a brief overview on how a complete network inventory assessment can improve the health & security of network.
Posted: 19 Nov 2008 | Published: 19 Nov 2008
|
|