Air Force Communications and Information Center Reports

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Optimizing the PC Segment of California's IT Infrastructure
sponsored by Intel Corporation
CASE STUDY: Researchers found that by creating a dynamic IT environment- standardized, centralized, automated, and mobile-California can achieve a greener, more secure computing complex that improves productivity, delivering greater efficiency at a lower cost to taxpayers and the environment.
Posted: 27 May 2009 | Published: 27 May 2009

Intel Corporation

Into the Future: The Fast Track for Financial Markets
sponsored by IBM Line of Business
WHITE PAPER: This paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
Posted: 17 Jun 2008 | Published: 01 Sep 2007

IBM Line of Business

Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER: Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

Siperian, Inc.

Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER: When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007

IBM Software Group

The AI Disruption: Challenges and Guidance for Data Center Design
sponsored by Schneider Electric
WHITE PAPER: Artificial intelligence (AI) deployments are taking up an increasingly large portion of data center workloads. This paper explains relevant attributes and trends of AI workloads and describes the resulting data center challenges, including Guidance for how to address these challenges. Read on to learn more.
Posted: 25 Jan 2024 | Published: 26 Jan 2024

TOPICS:  .NET
Schneider Electric

Mastering Hybrid Cloud Backup Costs, Security and Management
sponsored by Veeam Software
EBOOK: Unlock cost-effective hybrid cloud backup strategies. Learn to secure data and improve efficiency with expert tips in this e-book.
Posted: 17 Oct 2024 | Published: 18 Oct 2024

TOPICS:  .NET
Veeam Software

Infosec culture: A former helicopter pilot's perspective
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.
Posted: 08 Feb 2021 | Published: 26 Mar 2018

TechTarget ComputerWeekly.com

Optimizing AI Infrastructure: The Critical Role of Liquid Cooling
sponsored by Schneider Electric
WHITE PAPER: As AI workloads drive the need for high-performance computing, liquid cooling is essential to dissipate heat and maintain optimal performance. This white paper explores the role of liquid cooling in optimizing AI infrastructure, addressing key concerns, and providing planning guidance for successful implementation.
Posted: 13 Feb 2025 | Published: 13 Feb 2025

Schneider Electric

Security by design: How Verizon approaches 5G security.
sponsored by Verizon
WHITE PAPER: As 5G enables new capabilities, security is a key design feature. This white paper examines Verizon's approach to 5G security, including enhancements over 4G, private 5G networks, and alignment with CISA guidelines. Read the full white paper to learn how Verizon is securing 5G for public and private sector organizations.
Posted: 19 Nov 2024 | Published: 20 Nov 2024

Verizon

Idc Marketscape: Worldwide Commercial Content Delivery Network Services 2022 Vendor Assessment
sponsored by Fastly
ANALYST REPORT: The commercial content delivery network (CDN) market is a mature market that carries a substantial portion of the world's internet traffic. Read this IDC report to fully understand the CDN market and the ingredients that drive growth and differentiation in this marketplace amongst CDN services and providers.
Posted: 20 May 2022 | Published: 20 May 2022

TOPICS:  .NET
Fastly

A case study in critical infrastructure interdependency
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series provides a short introduction to Critical Infrastructure Protection.
Posted: 08 Feb 2021 | Published: 02 Sep 2016

TechTarget ComputerWeekly.com

Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018

TechTarget ComputerWeekly.com

Royal Holloway: Driverless vehicle security for military applications
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
Posted: 08 Feb 2021 | Published: 14 Jul 2020

TechTarget ComputerWeekly.com

The CISO's guide to supply chain security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021

TechTarget ComputerWeekly.com

Computer Weekly – 2 August 2016: Giving fashion a digital makeover
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how one of the UK's biggest mail order retailers is moving to digital. We examine the growing importance of network function virtualisation. And a year after Microsoft turned Lync into Skype for Business, we assess how the unified communications product is faring. Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

2023-2024 Sustainability Report
sponsored by Panduit
EBOOK: Panduit's 2023-2024 Sustainability Report highlights their commitment to environmental stewardship, diversity, and ethical governance. They focus on reducing their carbon footprint, supporting community initiatives, fostering an inclusive workplace, and upholding high ethical standards. Read the white paper on sustainable connectivity solutions.
Posted: 17 Mar 2025 | Published: 18 Mar 2025

Panduit

IT/OT convergence is necessary, but not so simple
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This handbook outlines best practices for building a secure IT/OT convergence and integration strategy, as well as insights into why people may just be the most critical piece of the IT/OT convergence security equation.
Posted: 08 Feb 2021 | Published: 14 Aug 2020

TechTarget ComputerWeekly.com

Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Jun 2020

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to datacentre cooling
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Effective cooling methods are essential for the running of the datacentre. In this 16-page buyer's guide, Computer Weekly looks at how to power them efficiently, the potential of a shift to liquid cooling systems and the most cost-effective methods of datacentre cooling.
Posted: 08 Feb 2021 | Published: 05 Jun 2020

TechTarget ComputerWeekly.com

How Can Internet Hijacking be Prevented or Mitigated?
sponsored by Dimension Data
EGUIDE: In this e-guide learn the benefits of basic cyberhygiene in combating persistent attacks and become more effective in protecting your enterprise's data.
Posted: 08 Feb 2021 | Published: 21 Sep 2016

Dimension Data

CW Benelux ezine August 2016
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW Benelux we describe how data scientists in the Netherlands have applied technology to art.
Posted: 08 Feb 2021 | Published: 15 Aug 2016

TechTarget ComputerWeekly.com

How virtual desktops simplify end user computing during lockdown
sponsored by TechTarget ComputerWeekly.com
EGUIDE: While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.
Posted: 15 Mar 2021 | Published: 19 Feb 2021

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to video conferencing and collaboration
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this 17-page buyer's guide, Computer Weekly looks at how employers can support a future of flexible working, with video conferencing, collaboration, augmented reality and unified comms technologies all lined up to play a part.
Posted: 15 Mar 2021 | Published: 01 Mar 2021

TechTarget ComputerWeekly.com

How Modernizing Aging Data Center Infrastructure Improves Sustainability
sponsored by Schneider Electric
WHITE PAPER: In this white paper, dive into the challenges that aging infrastructure can pose to your environmental sustainability goals, and discover 3 approaches to modernizing your data center infrastructure systems.
Posted: 10 May 2023 | Published: 10 May 2023

TOPICS:  .NET
Schneider Electric

Your Guide to Data Center Infrastructure Management Tools
sponsored by Nlyte Software
EGUIDE: The definition of data center infrastructure management (DCIM) tools varies, but the nature of these tools is to give you deeper insight into your IT infrastructure and facilities. This e-guide gives you an understanding of DCIM, how to incorporate the tools into your organization, their impact on modern data centers, and more.
Posted: 08 Feb 2021 | Published: 12 Jul 2017

Nlyte Software

Nordics' IT leaders facing the coronavirus crisis
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at some of the innovations, in the region, that are addressing Covid-19 challenges. But we also feature news that many tech startups in the region might soon face problems innovating at all as investment funds dry up.
Posted: 08 Feb 2021 | Published: 23 Apr 2020

TechTarget ComputerWeekly.com

Datacentres of tomorrow: What the future holds
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we take a look at some of the technologies that are being widely-tipped to become a mainstay of datacentres in the future. At the same time, it also touches upon some of the new and emerging technologies that look set to shake-up the way datacentres are managed, monitored, powered and cooled as well.
Posted: 08 Feb 2021 | Published: 25 May 2020

TechTarget ComputerWeekly.com

How Covid-19 is affecting the colocation market
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This e-guide shares details of some of the latest trends and thinking in colocation, while also shining a light on how datacentre operators are rushing to meet the soaring demand for compute capacity they are seeing both from enterprises and hyperscale cloud firms.
Posted: 08 Feb 2021 | Published: 15 Sep 2020

TechTarget ComputerWeekly.com

Gamma International: The Macedonia files
sponsored by TechTarget ComputerWeekly.com
RESOURCE: This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 08 Feb 2021 | Published: 23 Nov 2017

TechTarget ComputerWeekly.com