PLA Reports

Computer Weekly@50: What was happening in July
sponsored by TechTarget ComputerWeekly.com
EBOOK: The National Museum of Computing has again been looking into Computer Weekly's 50 years of magazine issues for another selection of articles highlighting significant news published in the month of July over the past five decades.
Posted: 08 Feb 2021 | Published: 19 Jul 2016

TechTarget ComputerWeekly.com

Reduce data center complexity when you 'go virtual'
sponsored by HPE and Intel®
WHITE PAPER: Access this exclusive, in-depth resource to find out how HP's latest solution for virtual environments can benefit your organization.
Posted: 04 Mar 2014 | Published: 31 Dec 2013

HPE and Intel®

Product Overview - NVIDIA GRID K2 Graphics Board
sponsored by NVIDIA
PRODUCT OVERVIEW: Check out this informative resource to uncover the ins-and-outs of the NVIDIA GRID K2, so you can rest easy knowing you're fully prepared for deployment.
Posted: 01 Apr 2014 | Published: 31 Jan 2013

NVIDIA

High-performance Two-socket Server Supports a Variety of Business-Critical Workloads
sponsored by IBM and Intel.
DATA SHEET: Read this informative data sheet from IBM detailing their new server hardware optimized for cloud computing and desktop virtualization and learn how their new servers can cut downtime out of the equation for you and your organization.
Posted: 07 Jul 2014 | Published: 30 Sep 2013

IBM and Intel.

Fastest Path to Virtualization
sponsored by HPE and Intel®
BROCHURE: Explore this resource to find out how HP's ConvergedSystem for Virtualization can drive faster time-to-value while providing the scalability you need.
Posted: 04 Mar 2014 | Published: 31 Dec 2013

HPE and Intel®

Designing the Ideal Digital Work Experience for the Next Generation of Innovators
sponsored by Dell Technologies and Intel
ESG: User expectations for their digital work experience can vary by demographic, location, role and much more. But understanding these expectations is critical to the whole organization's long-term viability. Download this ESG report to explore the results of a comprehensive survey so you can design the ideal digital work experience.
Posted: 10 May 2023 | Published: 10 May 2023

TOPICS:  Hardware
Dell Technologies and Intel

Computer Weekly – 1 December 2015: Balancing speed and risk in IT projects
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as IT leaders face boardroom pressure to roll out IT projects ever more quickly, we examine how to do that without running unacceptable risks. Michael Dell talks about how he sees the future for his company when it buys EMC. And we hear from IT chiefs about the challenges of implementing DevOps. Read the issue now.
Posted: 30 Nov 2015 | Published: 30 Nov 2015

TechTarget ComputerWeekly.com

PowerEdge C8000 Chassis
sponsored by Dell, Inc. and Intel®
DATA SHEET: Optimize data center space and performance with the PowerEdge™ C8000, featuring compute, GPU and storage nodes to run several workloads in one chassis.
Posted: 07 Jan 2014 | Published: 31 Dec 2013

Dell, Inc. and Intel®

Flash Storage: 3 Dimensions of Value
sponsored by IBM
RESOURCE: Access this resource to learn about the three ways flash provides value and a strong ROI. Read on to find out why additional virtualization features prove that flash is a smart investment.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

IBM

UC Management Impact Report: The True Cost Of Unified Communicaons And Collaboraon
sponsored by Kurmi Software
INFOGRAPHIC: Today when managing MACDs (moves, adds, changes, deletes) in UCC platforms, 76% of users find an error 1/3 of the time or more, according to a survey of 100 UCC decision-makers. Access this infographic to discover the results of a survey of 100 UCC decision-makers.
Posted: 09 Mar 2022 | Published: 09 Mar 2022

TOPICS:  .NET
Kurmi Software

Paper free – are we there yet?
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this comprehensive report, AIIM Market Intelligence takes an in-depth look at the amount of paper in the office, the impediments to removing it, the take up of digital mailrooms and multi-channel capture, and the increasing exploitation of mobile and cloud.
Posted: 08 Feb 2021 | Published: 06 Dec 2016

TechTarget ComputerWeekly.com

Cybersecurity Threats: Managing Enterprise Risk and Ensuring Regulatory Compliance
sponsored by Silver Tail Systems
EGUIDE: This e-guide discusses the NERC compliance security threats, better cybersecurity through risk management, and what enterprise security administrators can do to defend themselves against such attacks.
Posted: 22 Feb 2011 | Published: 22 Feb 2011

Silver Tail Systems

IT Project: Hyper-converged infrastructure
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The term hyper-convergence means different things to different people. But at its core, hyper-convergence brings together servers and storage network resources that are managed as a single unit using software. In this e-guide, learn more about the benefits of hyper-convergence and how you can derive the greatest value from your investment.
Posted: 08 Feb 2021 | Published: 07 Apr 2017

TechTarget ComputerWeekly.com

CW Benelux - May 2020: IT budgets up in the air as Covid-19 disrupts business
sponsored by TechTarget ComputerWeekly.com
EZINE: Computer Weekly's annual IT priorities survey was carried out before the arrival of Covid-19 disrupted business plans. It found that more than half of the IT leaders in the Benelux region expected budgets to be higher this year than last, and digital transformation was to be the main recipient of budget increases.
Posted: 08 Feb 2021 | Published: 07 May 2020

TechTarget ComputerWeekly.com

CW Middle East April-June 2020: Quarter of Middle East businesses have no women in IT
sponsored by TechTarget ComputerWeekly.com
EZINE: The Middle East faces fierce competition for IT professionals with the right skills, so it is so worrying that the region's women are so underrepresented in the IT community. In fact over quarter of businesses in the Middle East have no women in their IT departments, according to Computer Weekly's Salary Survey.
Posted: 08 Feb 2021 | Published: 09 Apr 2020

TechTarget ComputerWeekly.com

Royal Holloway: Driverless vehicle security for military applications
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
Posted: 08 Feb 2021 | Published: 14 Jul 2020

TechTarget ComputerWeekly.com

The New Era of Big Data Security Analytics
sponsored by TechTarget Security
EGUIDE: This expert guide examines the reasons why Big Data security is so important, providing helpful tips for adapting and utilizing it to your business' advantage.
Posted: 10 Oct 2013 | Published: 10 Oct 2013

TechTarget Security

Computer Weekly –18 February 2020: Trust no one – the benefits of zero-trust security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we take an in-depth look at zero-trust security and examine how it changes traditional IT risk models. After SAP extended the support deadline for its ECC ERP system, we find out the options for users. And we analyse explainable AI and the ethical importance of understanding algorithms. Read the issue now.
Posted: 08 Feb 2021 | Published: 18 Feb 2020

TechTarget ComputerWeekly.com

CIO Trends #4: Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we look at some of the exciting technology developments being tested or already in use in the Middle East.
Posted: 08 Feb 2021 | Published: 11 Apr 2017

TechTarget ComputerWeekly.com

Explore the Threat Hunting Process
sponsored by TechTarget Security
EZINE: The threat hunting process hinges on an expert's ability to create hypotheses and to hunt for patterns and indicators of compromise in data-driven networks. In this issues of Information Security, explore learn how threat hunting programs can find security holes that machine learning or automated systems fail to detect.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TechTarget Security

Allure of the threat hunter draws companies large and small
sponsored by TechTarget Security
EZINE: Do you need a threat hunter on your analyst team? Threat hunting allows companies to be proactive, rather than wait for attackers to trigger alarms after they have already infiltrated an organization's systems. Yet not every company is ready to employ threat hunting techniques.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

TechTarget Security

Expert E-Book: Data Security and the Cloud
sponsored by TechTarget Security
EBOOK: This e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing.
Posted: 07 Feb 2011 | Published: 07 Feb 2011

TechTarget Security

Computer Weekly – 14 May 2019: The startups transforming data analytics
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we travel to Silicon Valley to meet the emerging tech startups hoping to take data analytics to a new level. The NHS desperately needs to recruit IT professionals – we look at the job opportunities. And we examine the best ways to keep cloud costs under control. Read the issue now.
Posted: 08 Feb 2021 | Published: 13 May 2019

TechTarget ComputerWeekly.com

How to Negotiate Your Cloud Contracts Like a Pro
sponsored by TechTarget CIO
EZINE: In this edition of CIO Decisions, you'll learn how to negotiate your cloud contracts like a pro. Discover articles with best practices.
Posted: 04 Nov 2015 | Published: 04 Nov 2015

TechTarget CIO

CW EMEA - January 2023: Protecting the privacy of schoolchildren
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.
Posted: 11 Jan 2023 | Published: 12 Jan 2023

TechTarget ComputerWeekly.com

Computer Weekly - 13 December 2022: AI experts question tech industry's ethical commitments
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the proliferation of ethical frameworks has done little to change how artificial intelligence is developed – we look at the challenges. We examine the future of the UK semiconductor sector as the government launches a review. And we hear how NatWest has put data at the heart of customer strategy. Read the issue now.
Posted: 13 Dec 2022 | Published: 13 Dec 2022

TechTarget ComputerWeekly.com

Information Security E-Zine – June 2014
sponsored by TechTarget Security
EZINE: Global threat intelligence services have continued to evolve and play more of role in SIEM and endpoint security products. How can threat intelligence benefit risk scenarios?
Posted: 02 Jun 2014 | Published: 02 Jun 2014

TechTarget Security

The Shortcut Guide to Assuring Website Performance through External Web Monitoring
sponsored by Neustar®
EBOOK: Businesses have become dependent on Web sites and RIAs. As dependency increases, so does the complexity of Web site systems and expectations on service delivery. This book offers a detailed look at external monitoring, how to leverage monitoring to protect your brand and a roadmap for implementing and maintaining an external monitoring process.
Posted: 15 Oct 2010 | Published: 15 Oct 2010

Neustar®