IEC Reports

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Storage Capacity 101 to Post-Grad in a Flash
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: In this report from Quocirca, analyst Clive Longbottom explains why you don't always get what you think you're getting with flash storage.
Posted: 08 Feb 2021 | Published: 14 Mar 2016

TechTarget ComputerWeekly.com

How to Design Physical Infrastructure for Distributed Computing
sponsored by Schneider Electric
WHITE PAPER: Distributed computing has unique infrastructure challenges. Explore tips for securing IT, commercial, and industrial environments. Learn how to mitigate risks like temperature, humidity, water, and vibration. Download the white paper to design resilient distributed computing infrastructure
Posted: 03 Nov 2021 | Published: 20 Feb 2025

Schneider Electric

Power Distribution Units
sponsored by Panduit
PRODUCT OVERVIEW: Panduit's Power Distribution Units offer versatile solutions for data centers, from basic to intelligent PDUs with advanced monitoring. Features include high-temperature operation, hot-swappable controllers, and integration with Cisco Nexus Dashboard for energy management. Discover how Panduit PDUs enhance efficiency and protect infrastructure.
Posted: 18 Mar 2025 | Published: 18 Mar 2025

Panduit

Navigating The Evolving Compliance Landscape: The Role Of Identity Governance In Meeting Regulatory And Security Challenges
sponsored by Omada
WHITE PAPER: Compliance is complex as regulations like GDPR, NIS2, and DORA expand. This white paper explores how Identity Governance and Administration (IGA) streamlines compliance, reduces risk, and enhances efficiency through automated user lifecycle management, access controls, and audit-ready processes. See how IGA turns compliance into an advantage.
Posted: 31 Jan 2025 | Published: 31 Jan 2025

All resources sponsored by Omada

Achieve CMMC compliance with Google Workspace
sponsored by Google Workspace
EBOOK: Google Workspace with Assured Controls Plus aids Defense Industrial Base organizations in meeting CMMC requirements for email, collaboration, and data management. It provides robust security, encryption, and compliance at a lower cost than traditional solutions. Discover how Workspace supports your CMMC journey in this detailed eBook.
Posted: 07 Mar 2025 | Published: 07 Mar 2025

Google Workspace

VXWorks for Aerospace and Defense
sponsored by Wind River
PRODUCT OVERVIEW: VxWorks® aerospace and defense software saves costs and accelerates certification. Proven in 750+ safety programs and 120+ aircraft, Read how VxWorks streamlines compliance, satisfies real-time operating systems needs, secures systems, simplifies software integration, and inspires developers.
Posted: 02 Dec 2023 | Published: 02 Dec 2023

TOPICS:  .NET
Wind River

How to Build a Proactive Compliance Program with Identity Security
sponsored by CyberArk
EBOOK: This eBook reviews nearly 20 global regulations and frameworks, with details on their security-focused requirements. This includes:NIS2 directiveDORANIST Special Publication 800-207 on Zero Trust ArchitectureDownload the eBook and learn how you can streamline compliance initiatives.
Posted: 20 Dec 2024 | Published: 01 Jan 2025

TOPICS:  .NET
CyberArk

Prefabricated and Micro Datacentres: The Essential Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As debate continues to rage about what role private, enterprise-owned datacentres will play in firms' IT strategies in the years to come, what is becoming clear is that they type of facilities companies rely on are sure to change in line with their evolving business needs.
Posted: 08 Feb 2021 | Published: 26 Sep 2016

TechTarget ComputerWeekly.com

Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 15 Mar 2021 | Published: 31 Dec 2020

McGraw Hill

The AI Disruption: Challenges and Guidance for Data Center Design
sponsored by Schneider Electric
WHITE PAPER: Artificial intelligence (AI) deployments are taking up an increasingly large portion of data center workloads. This paper explains relevant attributes and trends of AI workloads and describes the resulting data center challenges, including Guidance for how to address these challenges. Read on to learn more.
Posted: 25 Jan 2024 | Published: 26 Jan 2024

TOPICS:  .NET
Schneider Electric

Step-by-step disaster recovery planning guide
sponsored by TechTarget ComputerWeekly.com
EBOOK: IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.
Posted: 29 Mar 2022 | Published: 29 Mar 2022

TechTarget ComputerWeekly.com

Link Software Development to Measured Business Value Creation
sponsored by JBS Custom Software Solutions
EBOOK: PH
Posted: 04 Jun 2021 | Published: 04 Jun 2021

All resources sponsored by JBS Custom Software Solutions

Top Priority IT Tasks: Risk Management and Regulatory Compliance
sponsored by Dell Software
EGUIDE: In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.
Posted: 08 Feb 2021 | Published: 05 Oct 2016

Dell Software

A Computer Weekly Buyer's Guide to Internet of Things Security
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.
Posted: 08 Feb 2021 | Published: 07 Feb 2017

TechTarget ComputerWeekly.com

Infosec culture: A former helicopter pilot's perspective
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.
Posted: 08 Feb 2021 | Published: 26 Mar 2018

TechTarget ComputerWeekly.com

Guide to safeguarding payroll data in internationally expanding organisations (IN)
sponsored by ADP
RESEARCH CONTENT: Despite the increasing cyber-attacks and data insecurity trends, only 52% of today’s companies report that they’ve developed a playbook and a contingency plan across their geographies. This is concerning, especially for payroll teams. Browse this report to learn more.
Posted: 15 Feb 2024 | Published: 25 Jan 2024

TOPICS:  .NET
ADP

Guide to safeguarding payroll data in internationally expanding organisations (AU)
sponsored by ADP
RESEARCH CONTENT: Despite the increasing cyber-attacks and data insecurity trends, only 52% of today’s companies report that they’ve developed a playbook and a contingency plan across their geographies. This is concerning, especially for payroll teams. Browse this report to learn more.
Posted: 24 Jan 2024 | Published: 25 Jan 2024

TOPICS:  .NET
ADP

Guide to safeguarding payroll data in internationally expanding organisations (PH)
sponsored by ADP
RESEARCH CONTENT: Despite the increasing cyber-attacks and data insecurity trends, only 52% of today’s companies report that they’ve developed a playbook and a contingency plan across their geographies. This is concerning, especially for payroll teams. Browse this report to learn more.
Posted: 07 Feb 2024 | Published: 07 Feb 2024

TOPICS:  .NET
ADP

Guide to safeguarding payroll data in internationally expanding organisations (SG)
sponsored by ADP
RESEARCH CONTENT: Despite the increasing cyber-attacks and data insecurity trends, only 52% of today’s companies report that they’ve developed a playbook and a contingency plan across their geographies. This is concerning, especially for payroll teams. Browse this report to learn more.
Posted: 07 Feb 2024 | Published: 07 Feb 2024

TOPICS:  .NET
ADP

Guide to safeguarding payroll data in internationally expanding organisations (HK)
sponsored by ADP
RESEARCH CONTENT: Despite the increasing cyber-attacks and data insecurity trends, only 52% of today’s companies report that they’ve developed a playbook and a contingency plan across their geographies. This is concerning, especially for payroll teams. Browse this report to learn more.
Posted: 24 Jan 2024 | Published: 24 Jan 2024

TOPICS:  .NET
ADP

The Ultimate Buyer’s Guide For Secure Access Solutions
sponsored by Claroty
BUYER'S GUIDE: Cyber-Physical Systems (CPS) form the foundation of many critical infrastructure sectors. This guide helps ensure you are choosing the right vendor to meet your unique needs by examining the CPS cybersecurity landscape, criteria to consider when looking for a secure remote access solution, key outcomes of secure access, and more.
Posted: 27 Mar 2025 | Published: 27 Mar 2025

TOPICS:  .NET
Claroty

Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Cyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
Posted: 08 Feb 2021 | Published: 05 Aug 2016

TechTarget ComputerWeekly.com

Build Solar Better Balance of System Solutions from PV Module to Transmission Line
sponsored by Panduit
PRODUCT OVERVIEW: Explore Panduit's balance of system solutions for solar plants, from module to transmission. Featuring UV-resistant cable management, grounding, identification, and protection components for efficiency and reliability in harsh environments. Read this white paper to learn how BOS components can reduce downtime and maximize your solar project's ROI.
Posted: 17 Mar 2025 | Published: 18 Mar 2025

Panduit

Rockford Public Schools: Modernizing Their Data Center Infrastructure to Enhance Education
sponsored by Panduit
CASE STUDY: Rockford Public Schools partnered with Panduit and Graybar to modernize their data center, addressing outdated systems and security issues. The project standardized IT policies, improved reliability, and supported digital transformation across 41 schools for 27,700 students. See how this partnership created a future-ready educational environment.
Posted: 17 Mar 2025 | Published: 18 Mar 2025

Panduit

GDPR: Risk, opportunity and what it means for security professionals
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.
Posted: 08 Feb 2021 | Published: 10 May 2018

TechTarget ComputerWeekly.com