DOD Reports

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Optimizing the PC Segment of California's IT Infrastructure
sponsored by Intel Corporation
CASE STUDY: Researchers found that by creating a dynamic IT environment- standardized, centralized, automated, and mobile-California can achieve a greener, more secure computing complex that improves productivity, delivering greater efficiency at a lower cost to taxpayers and the environment.
Posted: 27 May 2009 | Published: 27 May 2009

Intel Corporation

Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER: When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007

IBM Software Group

Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER: Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

Siperian, Inc.

Into the Future: The Fast Track for Financial Markets
sponsored by IBM Line of Business
WHITE PAPER: This paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
Posted: 17 Jun 2008 | Published: 01 Sep 2007

IBM Line of Business

Webinar - CMMC Compliance: Critical Cybersecurity Strategies To Close Compliance Gaps
sponsored by Corsica Technologies
WEBCAST: The Cybersecurity Maturity Model Certification (CMMC) is a program designed to enforce the protection of sensitive unclassified information shared by the DoD. Tune into this webinar to gain a CMMC 101 overview so your organization is adequately prepared to comply moving forward.
Posted: 14 Feb 2025 | Premiered: Feb 14, 2025

TOPICS:  .NET
Corsica Technologies

Achieve CMMC compliance with Google Workspace
sponsored by Google Workspace
EBOOK: Google Workspace with Assured Controls Plus aids Defense Industrial Base organizations in meeting CMMC requirements for email, collaboration, and data management. It provides robust security, encryption, and compliance at a lower cost than traditional solutions. Discover how Workspace supports your CMMC journey in this detailed eBook.
Posted: 07 Mar 2025 | Published: 07 Mar 2025

Google Workspace

MRO: Fleet Maintenance Solutions
sponsored by Zebra Technologies
PRODUCT OVERVIEW: Zebra Technologies offers fleet maintenance solutions to help military operations enhance efficiency, compliance, and real-time visibility. Improve security, parts tracking, documentation, and regulatory adherence to ensure mission readiness. Read the full application brief to discover Zebra's advanced fleet management capabilities.
Posted: 27 Sep 2024 | Published: 27 Sep 2024

Zebra Technologies

Materiel Logistics with Barcoding
sponsored by Zebra Technologies
PRODUCT OVERVIEW: Zebra's barcoding solutions can modernize U.S. Military materiel logistics, enhancing security, inventory visibility, compliance, and efficiency. Learn how Zebra's scanners, wearables, printers, and more can elevate your logistics operations by reading the full product overview.
Posted: 27 Sep 2024 | Published: 27 Sep 2024

Zebra Technologies

Who will win the world's biggest cloud contract?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.
Posted: 08 Feb 2021 | Published: 20 Aug 2019

TechTarget ComputerWeekly.com

MRO: Facilities Management Solutions
sponsored by Zebra Technologies
PRODUCT OVERVIEW: Zebra's facility management solutions empower defense operations with enhanced security, optimized staff communication, improved efficiency, and streamlined asset management. Learn how Zebra can help your military facilities achieve a performance edge by reading the full application brief.
Posted: 27 Sep 2024 | Published: 27 Sep 2024

Zebra Technologies

AWS Re:Invent 2019: What CIOs need to know from this year's show
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Amazon Web Services (AWS) Re:Invent user conference saw 65,000 users, developers and business leaders convene in Las Vegas to hear news about the firm's innovation priorities. In this e-guide, we provide a round-up of all the big stories and announcements from this year's Re:Invent, and give readers some clues as to where AWS is heading next.
Posted: 08 Feb 2021 | Published: 09 Dec 2019

TechTarget ComputerWeekly.com

DEVSECOPS BUYER’S GUIDE: APPLICATION SECURITY
sponsored by Contrast Security
EGUIDE: Read this DevSecOps Buyer’s Guide and get the comprehensive checklist you need to assess, vet, and purchase a DevSecOps platform that delivers accurate, continuous, and integrated security monitoring and remediation.
Posted: 15 Feb 2022 | Published: 16 Feb 2022

TOPICS:  .NET
Contrast Security

Top 10 broadband stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The European broadband industry in 2019 was a place of huge activity and investment, with one overarching theme – full-fibre roll-out. The fundamental benefit of such networks seemed as crystal clear as the fibres themselves – support for business transformation. Here are Computer Weekly's top 10 networking stories of 2019.
Posted: 08 Feb 2021 | Published: 24 Dec 2019

TechTarget ComputerWeekly.com

Why cloud? Why now? A Qlik Cloud Comparison Guide
sponsored by Qlik
EBOOK: Discover the advantages of a modern, AI-powered cloud analytics platform. This Qlik Cloud Comparison Guide highlights key differences from on-premises solutions, including enhanced security, data management, AI-powered analytics, machine learning, and automation. See how Qlik Cloud elevates your analytics. Read the Qlik Cloud Comparison Guide
Posted: 13 Sep 2024 | Published: 14 Sep 2024

Qlik

Computer Weekly - 31 March 2020: Can the internet take the strain?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as millions of people work from home, we examine the measures in place to make sure the internet stays up and running. Our latest buyer's guide looks at the best practice in application modernisation. And we find out how IT leaders are tackling the skills shortage to recruit the best tech talent. Read the issue now.
Posted: 08 Feb 2021 | Published: 31 Mar 2020

TechTarget ComputerWeekly.com

How MSPs can Implement Compliance Mandated Access Management Controls
sponsored by CyberQP
WHITE PAPER: Explore how MSPs can secure admin accounts and customer identities to meet NIST and CMMC compliance requirements. Learn about privileged access management, password updates, and other best practices to protect your environment. Read the full white paper for more insights.
Posted: 03 Jan 2025 | Published: 04 Jan 2025

CyberQP

CW Benelux - February-April 2021: Is reluctance to report cyber crimes in the Netherlands helping the criminals to get away?
sponsored by TechTarget ComputerWeekly.com
EZINE: According to an academic study in the Netherlands, only one in seven Dutch people report a cyber crime to the police when it happens - feeling it is better to sort the problem out themselves because they don't think the police will do anything.
Posted: 08 Feb 2021 | Published: 11 Feb 2021

TechTarget ComputerWeekly.com

Stop Security Breaches Cold With CrowdStrike On Google Cloud
sponsored by Google Cloud & Crowdstrike
PRODUCT OVERVIEW: CrowdStrike and Google Cloud have partnered to deliver AI-powered security solutions that protect cloud workloads, enhance visibility, and accelerate threat response. Their offerings provide protection across Google Cloud services, Chrome Enterprise, and Workspace, helping organizations stop breaches and secure assets. Read the overview for more.
Posted: 27 Feb 2025 | Published: 27 Feb 2025

Google Cloud & Crowdstrike

Top 10 cloud stories of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK: There have been plenty of ups and downs in the world of cloud over the course of 2021. The public sector has emerged as a core battleground for both public cloud giants and their smaller rivals, sustainability became more important in the cloud sourcing decisions than ever before and much more. Look at top 10 cloud stories of 2021.
Posted: 24 Jan 2022 | Published: 24 Jan 2022

TechTarget ComputerWeekly.com

Top 10 cloud stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Adopting a hybrid-centric or multicloud strategy is increasingly becoming the favoured approach for many enterprises, including those operating in verticals that were previously sceptical or too tightly regulated to consider moving to the cloud in the past. Here's a look back over Computer Weekly's top 10 cloud stories of 2019.
Posted: 08 Feb 2021 | Published: 28 Jan 2020

TechTarget ComputerWeekly.com

Zero Trust, Simplified Benefits of the CoIP® Platform Overlay
sponsored by Zentera Systems Inc.
WHITE PAPER: Explore the simplified benefits of Zentera's CoIP Platform for implementing a robust Zero Trust architecture. Learn how this software-defined approach can reduce your attack surface, enable rapid compliance, and avoid costly infrastructure changes. Read the white paper to get started.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

Dell PowerStore Resiliency
sponsored by Dell Technologies and Intel
EGUIDE: ESG just released a Technical First Look at Dell PowerStore Prime to assess its resiliency and cybersecurity enhancements. PowerStore Prime offers a complete and robust set of local, remote and cloud data mobility and protection options to provide your business with a strategic advantage in today's data-driven world.
Posted: 29 Jan 2025 | Published: 06 Sep 2024

TOPICS:  .NET
Dell Technologies and Intel

ESG Dell PowerStore Resiliency
sponsored by Dell Technologies
EGUIDE: ESG just released a Technical First Look at Dell PowerStore Prime to assess its resiliency and cybersecurity enhancements. PowerStore Prime offers a complete and robust set of local, remote and cloud data mobility and protection options to provide your business with a strategic advantage in today's data-driven world.
Posted: 06 Feb 2025 | Published: 31 May 2024

Dell Technologies

Dell PowerStore Resiliency
sponsored by Dell Technologies
ESG TECHNICAL VALIDATION REPORT: Enterprise Strategy Group reviewed the new Dell PowerStore Prime solution’s capabilities and assessed how it would benefit customers. PowerStore Prime offers local, remote, and cloud data protection capabilities that ensures an organization’s data is highly available and resilient against cyberthreats. Read the ESG report now.
Posted: 09 Sep 2024 | Published: 09 Sep 2024

TOPICS:  .NET
Dell Technologies

6 Steps to Establishing Secure and Modernized Military Distribution Center and Warehouse Operations
sponsored by Zebra Technologies
EBOOK: Modernize your military distribution center and warehouse operations with 6 critical steps. Learn how to upgrade worker technology, improve communications, and integrate advanced inventory tracking. Download this e-book to transform your warehousing operations.
Posted: 27 Sep 2024 | Published: 27 Sep 2024

Zebra Technologies

Computer Weekly - 2 February 2021: Business intelligence helps ambulance service's pandemic response
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how one ambulance service is using business intelligence tools to join up datasets to improve its response to the Covid-19 pandemic. Our latest buyer's guide examines video conferencing and collaboration. And we look at the benefits of real-time streaming data analytics. Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Feb 2021

TechTarget ComputerWeekly.com

Legacy PKI Migration
sponsored by CyberArk
WHITE PAPER: Public Key Infrastructures (PKIs) are a foundational and critical element of every organization's cybersecurity. But legacy PKIs are too antiquated for today's lightning-fast, hyperconnected business world. Read this white paper to explore why the answer to your broken legacy PKI may be a PKI-as-a-service solution.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

CyberArk

CW Benelux - May 2020: IT budgets up in the air as Covid-19 disrupts business
sponsored by TechTarget ComputerWeekly.com
EZINE: Computer Weekly's annual IT priorities survey was carried out before the arrival of Covid-19 disrupted business plans. It found that more than half of the IT leaders in the Benelux region expected budgets to be higher this year than last, and digital transformation was to be the main recipient of budget increases.
Posted: 08 Feb 2021 | Published: 07 May 2020

TechTarget ComputerWeekly.com

CW Middle East April-June 2020: Quarter of Middle East businesses have no women in IT
sponsored by TechTarget ComputerWeekly.com
EZINE: The Middle East faces fierce competition for IT professionals with the right skills, so it is so worrying that the region's women are so underrepresented in the IT community. In fact over quarter of businesses in the Middle East have no women in their IT departments, according to Computer Weekly's Salary Survey.
Posted: 08 Feb 2021 | Published: 09 Apr 2020

TechTarget ComputerWeekly.com