Web Enabling Reports

Computer Weekly – 4 February 2020: Ethics and the internet – how to build a web we can trust
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the steps being taken to ensure the future development of the web is ethical and open. We discuss the UK's cyber security skills gap and ask what more the government should be doing. And we find out how cloud technology could help people stop smoking. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 Feb 2020

TechTarget ComputerWeekly.com

Webcast: Why Choose IBM for Your Desktop Alternative and Collaboration Software
sponsored by IBM Software Group
WEBCAST: Learn how the IBM collaboration software portfolio is being transformed with Web 2.0, social networking and unified communications capabilities.
Posted: 28 Nov 2007 | Premiered: Sep 26, 2007

IBM Software Group

Integrating CICS Using SOA and Web Services
sponsored by HostBridge Technology
WHITE PAPER: HostBridge is mainframe-based software that allows CICS applications and data to be accessed by, and integrated with, any type of distributed application. Fast, easy installation with no configuration provides immediate access to your CICS resources.
Posted: 20 Feb 2005 | Published: 16 Jun 2005

HostBridge Technology

Computer Weekly – 23 April 2024: How data keeps Britain's trains on track
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how Network Rail is ensuring train safety in the face of extreme weather thanks to advanced data analytics. Our latest buyer's guide examines the latest trends in storage technology. And we talk to the Ministry of Defence's first ever chief data officer. Read the issue now.
Posted: 19 Apr 2024 | Published: 23 Apr 2024

TechTarget ComputerWeekly.com

The Automation Architect’s Handbook: Leading End-To-End Automation Journeys
sponsored by Red Hat
EBOOK: In this automation architect’s guiding e-book, discover a walkthrough map of the steps required to lead your organization beyond task-centric automation toward an enterprise-wide strategy.
Posted: 19 Apr 2024 | Published: 19 Apr 2024

Red Hat

12 API security best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
Posted: 14 Feb 2023 | Published: 14 Feb 2023

TechTarget ComputerWeekly.com

Computer Weekly Innovation Awards APAC 2024 - Nomination form
sponsored by TechTarget ComputerWeekly.com
DATA SHEET: The Computer Weekly Innovation Awards APAC 2024 will once again shine the spotlight on digital transformation projects that have delivered business impact and/or solved problems using innovative approaches. All entries will be assessed by an independent panel of judges. Download your nomination form here.
Posted: 30 Nov 2023 | Published: 01 Dec 2023

TechTarget ComputerWeekly.com

Ten Ways to Replace Ineffective Meetings
sponsored by Slack
WHITE PAPER: How your business can increase productivity and cut costs by swapping meetings with asynchronous work and task automation.
Posted: 20 Dec 2023 | Published: 20 Dec 2023

TOPICS:  IT Management
Slack

Computer Weekly – 7 November 2023: How ExxonMobil is leading with data
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the leader of ExxonMobil's data organisation, about the energy giant's strategy to establish enterprise-wide principles for the use of data. As the UK's Online Safety Act comes into force, we examine the tech sector's concerns over the laws around end-to-end encryption. Read the issue now.
Posted: 06 Nov 2023 | Published: 07 Nov 2023

TechTarget ComputerWeekly.com

The Holistic Identity Security Maturity Model
sponsored by CyberArk
WHITE PAPER: Understanding where your organization stands in the Identity Security Maturity Model can help you identify gaps and plan for improvement in your Identity Security strategy. Read this paper to learn more and find your place in the model.
Posted: 24 Mar 2023 | Published: 24 Mar 2023

TOPICS:  IT Management
CyberArk