Standards Bodies Reports

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Accelerating Secure, Private, and Compliant AI Transformation
sponsored by Google
ESG SHOWCASE: As AI adoption accelerates, organizations face concerns around data protection, system security, and reputational risk. This showcase explores Google Cloud's AI Protection solution, offering discovery, control, and threat management to help organizations securely build, deploy, and run AI workloads. Download the showcase to learn more.
Posted: 14 Mar 2025 | Published: 14 Mar 2025

Google

Use Standardization To Reduce IT Complexity And Accelerate Innovation
sponsored by Red Hat
WHITE PAPER: IT complexity often can’t be avoided as cyber-attack trends evolve and burgeoning data volumes show no signs of slowing down. Operating system (OS) standardization can significantly reduce this complexity, though, enabling heightened security and reduced technical debt. Read on now to learn more.
Posted: 15 Mar 2025 | Published: 15 Mar 2025

TOPICS:  .NET
Red Hat

Top 12 most commonly used IoT protocols and standards
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Researchers estimate the number of IoT connections will reach 30.9 billion by 2025. Nowadays, IoT protocols are as critical to the existence of IoT as the things themselves. Technologists can select from multiple communication protocols when building a network to serve their IoT ecosystem. In this infographic, we list the most common ones.
Posted: 10 Aug 2022 | Published: 10 Aug 2022

TechTarget ComputerWeekly.com

CW Benelux - May-July 2019: A new vision for hackers
sponsored by TechTarget ComputerWeekly.com
EZINE: With canal bridges, healthcare products, bicycles, ship components, buildings and even prosthetic body parts already in the scope of 3D printing, it's facinating to imagine how far the technology can go. Printing spaceships is no longer a fantasy. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 May 2019

TechTarget ComputerWeekly.com

Computer Weekly – 16 April 2024: VMware users hit by licence hikes after Broadcom takeover
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, VMware users are facing licence fee increases after the acquisition by Broadcom, with education bodies worst hit – we talk to unhappy customers. Read the issue now.
Posted: 12 Apr 2024 | Published: 16 Apr 2024

TechTarget ComputerWeekly.com

Computer Weekly – 10 October 2023: Teeing up tech at the Ryder Cup
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes at golf's Ryder Cup to see the tech firsts introduced to improve the fan experience. UK tech leaders explain why they feel 'betrayed' by the government's net-zero policy changes. Read the issue now.
Posted: 10 Oct 2023 | Published: 10 Oct 2023

TechTarget ComputerWeekly.com

Metadata Harvesting
sponsored by Panzura
PRODUCT OVERVIEW: This product overview examines metadata tagging in manufacturing, law enforcement, and utilities. It explains how extracting metadata from XML sidecar files can streamline storage, enhance searchability, and improve decision-making. Solutions like GRAU Data MetadataHub and Panzura Symphony are featured. Learn how metadata-driven storage optimizes.
Posted: 06 Mar 2025 | Published: 06 Mar 2025

Panzura

Make the switch from Citrix to Omnissa Horizon Infographic
sponsored by TD Synnex
INFOGRAPHIC: Discover why organizations choose Omnissa Horizon for virtualization. This trusted solution offers advanced capabilities, measurable results, and seamless migration. With hybrid management, superior user experience, and intrinsic security, Horizon delivers efficiencies. View the infographic to learn more about modernizing your workspace.
Posted: 11 Mar 2025 | Published: 11 Mar 2025

TD Synnex

XDR In 5G Networks: Enhancing Telco Security Through Generative AI
sponsored by Nokia
WHITE PAPER: As 5G architecture grows, security models must adapt. Enhanced with generative AI, Extended Detection and Response (XDR) solutions are vital for telecom networks. Nokia's NetGuard Cybersecurity Dome uses telco-specialized LLMs to detect threats and improve SOC response times. Discover how AI-assisted XDR transforms 5G security in this white paper.
Posted: 28 Mar 2025 | Published: 28 Mar 2025

Nokia

CIO Trends #2
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Computer Weekly talks to more IT leaders than any other publication, and our reporters gather in-depth insights into the challenges facing CIOs, CTOs and CDOs.
Posted: 08 Feb 2021 | Published: 03 Aug 2016

TechTarget ComputerWeekly.com

Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.
Posted: 28 Jan 2022 | Published: 01 Feb 2022

TechTarget ComputerWeekly.com

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

CIO Trends #2
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Computer Weekly talks to more IT leaders than any other publication, and our reporters gather in-depth insights into the challenges facing CIOs, CTOs and CDOs.
Posted: 08 Feb 2021 | Published: 26 Jul 2016

TOPICS:  CIOs
TechTarget ComputerWeekly.com

NVMe flash storage 101
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Flash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it.
Posted: 08 Feb 2021 | Published: 31 Mar 2017

TechTarget ComputerWeekly.com

CIO Trends Q1 2016
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This guide offers a collection of our most popular articles for IT leaders during the first few months of 2016, examining the changing role of CIOs and how to enhance their relationships with their peers across the business.
Posted: 08 Feb 2021 | Published: 11 Mar 2016

TechTarget ComputerWeekly.com

CIO Trends #2: Nordics
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Computer Weekly talks to more IT leaders than any other publication, and our reporters gather in-depth insights into the challenges facing CIOs, CTOs and CDOs. This guide offers a collection of our most popular articles for IT leaders,
Posted: 08 Feb 2021 | Published: 25 Aug 2016

TechTarget ComputerWeekly.com

Navigating the Future of Technology and Business
sponsored by Unisys
RESEARCH CONTENT: Explore eight pivotal IT trends shaping business strategy in 2025, from natural language AI interfaces and edge computing to hybrid cloud adoption and quantum-safe cryptography. Learn how workforce dynamics, hybrid work models, energy-efficient AI, and compliance standards impact your organization by reading the research report.
Posted: 20 Mar 2025 | Published: 20 Mar 2025

Unisys

Safety Challenges in Sterile IV Compounding
sponsored by Omnicell
INFOGRAPHIC: Sterile IV compounding faces significant safety challenges, with 74% of pharmacies reporting errors in the past year. Automation and technology are crucial to eliminate errors and reach a zero-error future. Download this infographic to learn how to improve your sterile compounding practices.
Posted: 14 Nov 2024 | Published: 15 Nov 2024

Omnicell

Top 10 Benelux stories of 2021
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Netherlands, Belgium and Luxembourg also have what is needed for an advanced tech sector. They are relatively rich and have a wealth of human talent and high education standards, with academics in the region setting new ground.  Here are Computer Weekly's top 10 stories about IT in the Benelux region.
Posted: 27 Jan 2022 | Published: 27 Jan 2022

TechTarget ComputerWeekly.com

Multi-pronged approach to cyber security professional development
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.
Posted: 08 Feb 2021 | Published: 21 Mar 2019

TechTarget ComputerWeekly.com

CW EMEA - March 2023: How Sweden is accelerating digitisation
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA, we find out how the CIO at Dutch company SHV Holdings goes about ensuring his group IT department provides the foundations for a wide variety of businesses to thrive digitally. Read the issue now.
Posted: 03 Mar 2023 | Published: 09 Mar 2023

TechTarget ComputerWeekly.com

The Definitive Guide to Data Quality
sponsored by Qlik
WHITE PAPER: This comprehensive guide explores factors that contribute to creating high-quality data and offers guidance on how enterprises can ensure their data meets high standards. Download the white paper now to learn how you can prioritize data quality and unlock its full potential.
Posted: 30 Jul 2024 | Published: 12 Aug 2024

Qlik

Computer Weekly – 12 September 2023: The dangers of breaking encryption
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we detail the concerns of IT experts about the UK's Online Safety Bill's proposals to weaken end-to-end message encryption. Our buyer's guide continues to look at the issues around integrating SaaS applications, with a particular eye to the proliferation of SaaS during the Covid pandemic. Read the issue now.
Posted: 11 Sep 2023 | Published: 12 Sep 2023

TechTarget ComputerWeekly.com

Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 15 Mar 2021 | Published: 31 Dec 2020

McGraw Hill

Top 10 Concerns Of Leveraging AI In Healthcare
sponsored by Surgical Safety Technologies
WHITE PAPER: AI benefits healthcare, but concerns about accuracy, bias, and ethics remain. This paper explores 10 key issues, from data security to information overload, and solutions through careful implementation and standards. Discover how AI can improve healthcare while preserving human expertise and patient safety.
Posted: 22 Mar 2025 | Published: 22 Mar 2025

All resources sponsored by Surgical Safety Technologies