CW@50 - What was making the news in May
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of May over the past five decades.
Posted: 08 Feb 2021 | Published: 09 May 2016
|
|
|
CW@50: March editions of Computer Weekly
sponsored by TechTarget ComputerWeekly.com
EZINE:
We search back through the Computer Weekly archives held at The National Museum of Computing to present what was happening in IT over the past five decades.
Posted: 08 Feb 2021 | Published: 15 Mar 2016
|
|
|
CW@50: What was making the news in June
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
Posted: 08 Feb 2021 | Published: 03 Jun 2016
|
|
|
Digital Revolution: Moving towards agility
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, read more about Citic Pacific Mining's success, the role of the CIO and chief digital officer at GE, and how Australia is planning to develop its digital competencies.
Posted: 08 Feb 2021 | Published: 21 Mar 2018
|
|
|
Digital secure remote payment: How Apple Pay can change the future of remote payments
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
Posted: 08 Feb 2021 | Published: 27 Mar 2018
|
|
|
Does a proprietary solution automatically mean vendor lock-in?
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT:
The dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?
Posted: 08 Feb 2021 | Published: 14 Mar 2016
|
|
|
Enterprise cloud applications – can we trust them?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
Posted: 08 Feb 2021 | Published: 27 Jul 2016
|
|
|
Essential Guide: Application Performance Management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This guide to managing application performance covers transaction speeds, networking, workflow and tools for performance detection and diagnosis.
Posted: 08 Feb 2021 | Published: 30 Nov 2017
|
|
|
Even fintech startups battling to meet cyber security skills
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
A study shows that most fintech startups, like most banks, are failing to address vulnerabilities in the web and mobile applications, underlining the scale of the challenge
Posted: 08 Feb 2021 | Published: 21 Aug 2019
|
|
|
Executive Interview: Unleashing blockchain's potential
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Labrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.
Posted: 13 May 2021 | Published: 14 May 2021
|
|
|
Extracting actionable data from banking malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
Posted: 08 Feb 2021 | Published: 17 Aug 2016
|
|
|
Dell PowerVault MD3000 3000 Mailbox Single Copy Cluster Microsoft Exchange 2007 Storage Solution
sponsored by DellEMC and Intel®
WHITE PAPER:
This white paper describes a tested and validated storage solution for a 3000 mailbox Exchange 2007 environment with Single Copy Cluster in a high availability clustering mechanism based on the Microsoft Cluster Service shared storage.
Posted: 27 Aug 2008 | Published: 27 Aug 2008
|
|
|
Dell PowerVault MD3000i 5000 Mailbox Single Copy Cluster Microsoft® Exchange 2007 Storage Solution
sponsored by DellEMC and Intel®
WHITE PAPER:
This document provides information on Dell's PowerVault MD3000i Plus MD1000 storage solution for Microsoft Exchange Server 2007, based on Microsoft Exchange Solution Reviewed Program (ESRP) Storage program.
Posted: 27 Aug 2008 | Published: 27 Aug 2008
|
|
|
Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER:
When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007
|
|
|
Designing Next Generation Test Systems
sponsored by National Instruments
BOOK:
This guide addresses challenges that pressure engineering teams to reduce the cost and time of testing, provides insight into how test managers and engineers are overcoming these challenges, and offers guidelines on building modular, software-defined...
Posted: 19 Feb 2008 | Published: 01 Jan 2006
|
|
|
Docmosis V2.0
sponsored by Docmosis
TRIAL SOFTWARE:
Generating reports from Java applications has traditionally been a difficult task with heavy coding effort in development and maintenance. Even where graphical tools are provided, users must learn how to use a new and sometimes cumbersome tool.
Posted: 17 Jun 2009 | Premiered: 15 Jun 2009
|
|
|
Documentum Digital Asset Manager
sponsored by EMC Corporation
SOFTWARE LISTING:
EMC Documentum Digital Asset Manager exposes a set of powerful transformations and enhanced content previews, enabling you to fully leverage the value of your digital assets.
Posted: 13 Mar 2008 | Published: 01 Mar 2008
|
|
|
Driving Business Success with Software Reuse
sponsored by IBM
WHITE PAPER:
This white paper explains how Software Reuse and its underlying fundamentals have evolved dramatically. It also discusses the benefits of constructing critical enterprise software applications through reusable parts.
Posted: 30 Jul 2008 | Published: 01 Mar 2008
|
|
|
Eight Strategies for First Rate Customer Service
sponsored by Cisco Systems, Inc.
WHITE PAPER:
This paper provides eight strategies for creating a relationship with your customers that will keep them coming back.
Posted: 06 Oct 2008 | Published: 03 Oct 2008
|
|
|
EMC Documentum Enterprise Records Management: The Problem of Enterprise Records Management
sponsored by EMC Corporation
WHITE PAPER:
This paper examines how one solution provider, EMC, is helping customers address electronic discovery challenges by helping customers manage their information infrastructure more effectively.
Posted: 13 Mar 2008 | Published: 01 Aug 2007
|
|
|
ENTERPRISE APPLICATION ARCHIVING: Unified Protection and Management for Enterprise Application Output
sponsored by EMC Corporation
WHITE PAPER:
Today easy management of and access to archives is more than compliance and governance, it is also about improving service, repurposing content, creating new revenue streams, protecting public safety and more.
Posted: 13 Mar 2008 | Published: 12 Mar 2008
|
|
|
Enterprise Engineer 3.5
sponsored by McLaren Software
PRODUCT LITERATURE:
McLaren's Enterprise Engineer application suite assures the integrity of your asset documentation, providing a single point of control to manage the lifecycle of asset related content.
Posted: 01 Feb 2008 | Published: 01 Jan 2008
|
|
|
Epicor ICE 2.0: Introducing Next-Generation Business Architecture
sponsored by Epicor Software Corporation
WHITE PAPER:
Epicor Internet Component Environment (ICE) 2.0 is a modern business architecture and application framework which utilizes a 100% service-oriented architecture (SOA) and Web 2.0 technologies for a new breed of enterprise solution.
Posted: 21 Nov 2008 | Published: 21 Nov 2008
|
|
|
Expert Ebook: Mastering PCI
sponsored by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco
BOOK:
This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
Posted: 20 Aug 2008 | Published: 20 Aug 2008
|
|
|
EZ Insight Report: IBM Rational Jazz Strategy for Collaborative Application Lifecycle Management (Full report)
sponsored by IBM
WHITE PAPER:
Analyst report which includes new or expanded discussion of Open Services for Lifecycle Collaboration, Rational Requirements Manager, Quality Manager, Insight, and IBM Software Delivery Services for Cloud and Rational Asset Manager.
Posted: 13 Mar 2009 | Published: 13 Mar 2009
|
|