Global Internet Reports

CW Benelux May 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: GDPR becomes law at the end of this month, so we take a look at how organisations in the Netherlands are preparing for it. Cover your eyes if you are squeamish as you only have days left to get things right.We lead this issue with a story published in February, so perhaps things have changed. But if not, some organisations should be concerned.
Posted: 08 Feb 2021 | Published: 01 May 2018

TechTarget ComputerWeekly.com

Computer Weekly – 20 September 2022: A gold medal performance for networking
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the IT team behind the 2022 Commonwealth Games in Birmingham delivered a winning performance, how the centuries-old London insurance market is going digital, thanks to Lloyd's of London, and how low-cost high street stores succumbed to the inevitable and are going online. Read the issue now.
Posted: 20 Sep 2022 | Published: 20 Sep 2022

TechTarget ComputerWeekly.com

CW Nordics - November 2021-January 2022: Could Iceland be the best place in the world for HPC?
sponsored by TechTarget ComputerWeekly.com
EZINE: Most of Iceland's cheap, sustainable energy is used by aluminium smelters, but the country's Landsvirkjun power company is now promoting other uses for it, including high-performance computing. Also read in this issue how IoT collaboration in Norway is reaching beyond industries such as mining and shipping to include fish farming.
Posted: 15 Nov 2021 | Published: 25 Nov 2021

TechTarget ComputerWeekly.com

How to be influential online
sponsored by TechTarget ComputerWeekly.com
BOOK: Web psychologist, Nathalie Nahai explains how to use the web and social media to communicate your message more effectively.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

TechTarget ComputerWeekly.com

How to Manage the Virtual, Automated Environment
sponsored by TechTarget Security
EGUIDE: SearchNetworking.com’s E-Guide on the new era of network management explores the challenges involved with cloud computing and virtualization and how to prevent and control VM sprawl.
Posted: 07 May 2012 | Published: 07 May 2012

TechTarget Security

The Azure IoT Suite: Connect, Analyse, Integrate
sponsored by Microsoft
EGUIDE: Learn how Microsoft has been busy building Azure into an internet of things (IoT) platform to serve companies with connected devices. Explore the key features and challenges of this technology, and discover use cases that can provide you with better connectivity, analytics capabilities, and ease of integration.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Microsoft

Top Five Security Issues for Small and Medium-Sized Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small and medium-sized businesses use the Internet and networked applications to reach new customers and serve their existing ones more effectively.
Posted: 22 Feb 2008 | Published: 01 Jan 2006

Cisco Systems, Inc.

Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop
sponsored by SysAid Technologies Ltd
WHITE PAPER: This resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.
Posted: 30 Aug 2012 | Published: 30 Aug 2012

SysAid Technologies Ltd

Government Could Miss IPv6 Deadline; Enterprises Make IPv6 Transition
sponsored by Hewlett Packard Enterprise
EGUIDE: Uncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett Packard Enterprise

A Practical Guide to the Internet of Things
sponsored by ServiceMax by GE Digital
EBOOK: In this expert e-book, learn how to make the most of networked devices and the Internet of Things (IoT) in the context of manufacturing. Plus, learn how to address security concerns and how different security requirements can determine the ways you engage with IoT.
Posted: 13 Mar 2015 | Published: 06 Mar 2015

ServiceMax by GE Digital