UNIX to UNIX Encoding Reports

Computer Weekly – 4 March 2025: Cutting the costs of AI
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we analyse how the emergence of the DeepSeek AI model shows how the cost of deploying AI is coming down. Samsung put a UK tech startup at the heart of its latest smartphone launch – we talk to its founder. And we look at a project looking to optimise road haulage to reduce carbon emissions. Read the issue now.
Posted: 04 Mar 2025 | Published: 04 Mar 2025

TechTarget ComputerWeekly.com

Computer Weekly - 15 March 2022: How the tech sector is supporting Ukraine
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.
Posted: 14 Mar 2022 | Published: 15 Mar 2022

TechTarget ComputerWeekly.com

Computer Weekly – 17 October 2017: Microsoft CEO Satya Nadella on empathy and innovation
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this week's Computer Weekly, Microsoft CEO Satya Nadella explains why he has made empathy a key part of technology innovation. We examine the latest news in the ongoing debate over the tax status of IT contractors in the public sector. And we ask if an emphasis on creativity will help attract more young people to work in IT. Read the issue now.
Posted: 08 Feb 2021 | Published: 13 Oct 2017

TechTarget ComputerWeekly.com

Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Nov 2016

TechTarget ComputerWeekly.com

Secure Voting
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 08 Feb 2021 | Published: 04 Apr 2016

TechTarget ComputerWeekly.com

Security Threat Report: July 2008
sponsored by Sophos
WHITE PAPER: This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Sophos

Smarter system development: a systems engineering trade study to support green initiatives with model-driven development
sponsored by IBM
WHITE PAPER: Trade study analysis is an effective method of comparing potential solutions to a given problem. Using a model-driven approach allows you to perform trade studies before development or implementation begins and saves time, money, and development headaches. Read on to learn more.
Posted: 14 May 2009 | Published: 01 Apr 2009

IBM

The Role of Integrated Requirements Management in Software Delivery
sponsored by IBM
WHITE PAPER: This paper is about the critical role that integrated requirements management can play in helping to ensure that your business goals and IT investment are continuously aligned.
Posted: 24 May 2010 | Published: 01 Oct 2007

IBM

Ten Steps to Better Requirements Management
sponsored by IBM
WHITE PAPER: Requirements definition and management is an activity that has the potential to deliver a high, fast ROI. This white paper explains the characteristics of a good requirement and presents ten steps to better requirements management. Read on to learn how better requirements translate into easier, higher quality projects.
Posted: 02 Apr 2009 | Published: 01 Oct 2008

IBM

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.