Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022
|
|
|
Into the Future: The Fast Track for Financial Markets
sponsored by IBM Line of Business
WHITE PAPER:
This paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
Posted: 17 Jun 2008 | Published: 01 Sep 2007
|
|
|
Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER:
When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007
|
|
|
Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER:
Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009
|
|
|
Optimizing the PC Segment of California's IT Infrastructure
sponsored by Intel Corporation
CASE STUDY:
Researchers found that by creating a dynamic IT environment- standardized, centralized, automated, and mobile-California can achieve a greener, more secure computing complex that improves productivity, delivering greater efficiency at a lower cost to taxpayers and the environment.
Posted: 27 May 2009 | Published: 27 May 2009
|
|
|
Examining the FTC's noncompete prohibition and how it affects healthcare
sponsored by XtelligentMedia Healthcare
EGUIDE:
The FTC recently prohibited noncompetes, a popular clause used in healthcare employment agreements, but legal challenges and clarifications are on the horizon.
Posted: 06 Jun 2024 | Published: 06 Jun 2024
|
|
|
HIPAA Compliance, Demystified
sponsored by Skyflow
EBOOK:
This e-book demystifies HIPAA compliance, detailing its history, key rules, and relevance to healthcare providers and tech companies. Learn about protected health information, privacy safeguards, and breach notifications. Understand how to navigate HIPAA regulations and protect sensitive data. Read to ensure your organization's compliance.
Posted: 15 Mar 2025 | Published: 15 Mar 2025
|
All resources sponsored by Skyflow
|
|
Enhancing Healthcare Security: NIST Framework and Health Breach Notification Rule
sponsored by XtelligentMedia Healthcare
EGUIDE:
The collection of best practices and standards found in the NIST Cybersecurity Framework can help healthcare organizations improve their overall security postures.Vendors of personal health records, including health apps and other non-HIPAA-covered businesses, are subject to the Federal Trade Commission's Health Breach Notification Rule.
Posted: 23 Jul 2024 | Published: 23 Jul 2024
|
|
|
When Healthcare Privacy & Marketing Performance Collide
sponsored by Freshpaint
EBOOK:
Healthcare marketers face shrinking budgets, stricter privacy rules & mounting pressure to deliver. Removing ad trackers like Meta’s pixel solves privacy issues but hurts performance. Access this guide to learn more.
Posted: 26 Feb 2025 | Published: 11 Feb 2025
|
|
|
A New Era in Compensation Benchmarking is Here
sponsored by Pave
WHITE PAPER:
Discover how a new era in compensation benchmarking has arrived. Learn about the latest trends and best practices for effective benchmarking in this insightful white paper.
Posted: 25 Feb 2025 | Published: 25 Feb 2025
|
All resources sponsored by Pave
|
|
Hipaa Hazards: Exploring Web Trackers Beyond Google Analytics
sponsored by Freshpaint
EBOOK:
Any web tracker that collects health information and personal identifiers puts you at risk of violating HIPAA. And there are a lot of web trackers that collect health information. To help you understand all of these web trackers, and what to do about them, the team over at Freshpaint put together this guide.
Posted: 29 May 2024 | Published: 29 May 2024
|
|
|
Computer Weekly – 30 July 2019: Digital takes the racing line in Formula One
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to the CIO of Formula One racing team Haas F1 to find out how technology is helping to compete with better-funded rivals. We examine the latest best practice advice on disaster planning. And we look at what the troubles at Deutsche Bank tell us about the rise of fintech startups. Read the issue now.
Posted: 08 Feb 2021 | Published: 30 Jul 2019
|
|
|
Jargon buster guide to GDPR
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.
Posted: 08 Feb 2021 | Published: 31 Mar 2017
|
|
|
5 Pitfalls That Undermine Your AI Readiness | Qlik eBook
sponsored by Qlik
EBOOK:
This white paper explores the 5 pitfalls that can undermine your AI readiness and how to avoid them. Inside, you'll discover the critical steps to build a robust data foundation, define clear business objectives, and mitigate AI risks and ethics concerns. Read the white paper to ensure your AI initiatives deliver tangible value.
Posted: 13 Sep 2024 | Published: 16 Sep 2024
|
|
|
Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018
sponsored by TechTarget ComputerWeekly.com
RESOURCE:
David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.
Posted: 08 Feb 2021 | Published: 06 Nov 2019
|
|
|
Computer Weekly – 6 September 2022: Out with the old at Asda
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to Asda's CIO Carl Dawson about the supermarket's cloud-oriented renovation of its technology stack. We narrate the security woes at Twitter. And we examine best practices for data backup. Read the issue now.
Posted: 02 Sep 2022 | Published: 06 Sep 2022
|
|
|
Computer Weekly – 9 July 2024: How data drives decisions at BAE Systems
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to the chief data officer of one of the UK's biggest manufacturers, BAE Systems, about data strategy and diversity. Microsoft's claims over sovereign cloud for government IT are under scrutiny – we examine the issues. And our latest buyer's guide looks at trends in cloud databases. Read the issue now.
Posted: 05 Jul 2024 | Published: 09 Jul 2024
|
|
|
How to Build a Proactive Compliance Program with Identity Security
sponsored by CyberArk
EBOOK:
This eBook reviews nearly 20 global regulations and frameworks, with details on their security-focused requirements. This includes:NIS2 directiveDORANIST Special Publication 800-207 on Zero Trust ArchitectureDownload the eBook and learn how you can streamline compliance initiatives.
Posted: 20 Dec 2024 | Published: 01 Jan 2025
|
|
|
CW Benelux ezine August 2016
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this issue of CW Benelux we describe how data scientists in the Netherlands have applied technology to art.
Posted: 08 Feb 2021 | Published: 15 Aug 2016
|
|
|
Protecting the IT attack surface while advancing digital transformation
sponsored by Tanium
WHITE PAPER:
To survive and to thrive, organizations must continue innovating, launching new products and services, and optimizing old ones. As a result, every organization’s attack surface will continue to change and, likely, grow. Learn how business leaders can keep up with these changes in this latest technical deep dive from Tanium experts.
Posted: 20 Sep 2022 | Published: 20 Sep 2022
|
|
|
Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.
Posted: 06 Apr 2022 | Published: 06 Apr 2022
|
|
|
Computer Weekly – 15 December 2020: How security will be different after Covid-19
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Dec 2020
|
|
|
Computer Weekly – 21 January 2020: How to avoid becoming the next Travelex
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at the lessons learned from the ransomware attack on Travelex and how other firms can avoid the same fate. As Microsoft ends support for Windows 7, we examine the issues for the many remaining users of the operating system. And healthcare CIOs explain the tech challenges facing the NHS. Read the issue now.
Posted: 08 Feb 2021 | Published: 21 Jan 2020
|
|
|
Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022
|
|
|
CW Europe - March-May 2021: Nordic tech startups create blueprint for post-Covid working environment
sponsored by TechTarget ComputerWeekly.com
EZINE:
Business can learn lessons from Nordic tech startups to prepare employees to return to the office after Covid restrictions end.
Posted: 15 Mar 2021 | Published: 11 Mar 2021
|
|
|
Computer Weekly - 10 August 2021: Real-time data analytics in action
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the emerging applications of real-time analytics and highlight the challenges for businesses to maximise the benefits. EU experts are calling for reform of US surveillance laws – we look at the issues. And we talk to the co-CEO of HR software giant Workday. Read the issue now.
Posted: 06 Aug 2021 | Published: 10 Aug 2021
|
|
|
Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated
sponsored by TechTarget ComputerWeekly.com
RESOURCE:
This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.
Posted: 08 Feb 2021 | Published: 06 Nov 2019
|
|
|
Cloud Native Application Protection Platforms
sponsored by Palo Alto Networks
EBOOK:
This e-book explores cloud native application protection platforms (CNAPPs) and how they enable collaborative security across development, DevOps, and security teams. Learn how CNAPPs provide a holistic approach to securing cloud native applications from code to cloud. Discover the foundations of comprehensive cloud security.
Posted: 20 Dec 2024 | Published: 21 Dec 2024
|
|