Web Enabling Reports

Computer Weekly – 4 February 2020: Ethics and the internet – how to build a web we can trust
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the steps being taken to ensure the future development of the web is ethical and open. We discuss the UK's cyber security skills gap and ask what more the government should be doing. And we find out how cloud technology could help people stop smoking. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 Feb 2020

TechTarget ComputerWeekly.com

Integrating CICS Using SOA and Web Services
sponsored by HostBridge Technology
WHITE PAPER: HostBridge is mainframe-based software that allows CICS applications and data to be accessed by, and integrated with, any type of distributed application. Fast, easy installation with no configuration provides immediate access to your CICS resources.
Posted: 20 Feb 2005 | Published: 16 Jun 2005

HostBridge Technology

Webcast: Why Choose IBM for Your Desktop Alternative and Collaboration Software
sponsored by IBM Software Group
WEBCAST: Learn how the IBM collaboration software portfolio is being transformed with Web 2.0, social networking and unified communications capabilities.
Posted: 28 Nov 2007 | Premiered: Sep 26, 2007

IBM Software Group

4 IT Automation Myths Dispelled
sponsored by Red Hat
EBOOK: Read this e-book to learn how to overcome practical barriers to holistic automation adoption within your organization. Coverage includes automation goal setting, common myths, how to unite teams and training, and scaling automation across the business.
Posted: 22 Apr 2024 | Published: 22 Apr 2024

Red Hat

Computer Weekly – 19 December 2023: The ransomware threat to UK critical infrastructure
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, a parliamentary report warns that a lack of ransomware preparedness at the highest levels of government is leaving UK critical national infrastructure dangerously exposed – we analyse the risks. We also examine how AI tools are helping to enhance cloud security. Read the issue now.
Posted: 18 Dec 2023 | Published: 19 Dec 2023

TechTarget ComputerWeekly.com

Infographic: How organizations are using generative AI in Asia-Pacific
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Enterprise Strategy Group (ESG), an IT analyst firm owned by Computer Weekly publisher TechTarget, has published research about generative AI (GenAI) enterprise use cases that shows the concept ranking higher than sustainability and cloud migration as a strategic priority for enterprise IT globally.
Posted: 04 Oct 2023 | Published: 05 Oct 2023

TechTarget ComputerWeekly.com

Computer Weekly – 19 September 2023: Securing Eurovision's online voting system against cyber attacks
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we discover how Once.net and Cloudfare defended the 2023 Eurovision Song Contest against cyber attacks. Our buyer's guide continues to look at integrating software-as-a-service applications, with the governance of SaaS connectivity to the fore. Read the issue now.
Posted: 15 Sep 2023 | Published: 19 Sep 2023

TechTarget ComputerWeekly.com

12 API security best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
Posted: 14 Feb 2023 | Published: 14 Feb 2023

TechTarget ComputerWeekly.com

Implementing GenAI: Use cases & challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The use cases of generative AI are wide-ranging and have the potential to impact nearly all areas in business and IT. In this e-guide on generative AI, learn how to put the technology to work in business applications, DevOps and IT, as well as manage implementation challenges and risks.
Posted: 07 Feb 2024 | Published: 08 Feb 2024

TechTarget ComputerWeekly.com

The Holistic Identity Security Maturity Model
sponsored by CyberArk
WHITE PAPER: Understanding where your organization stands in the Identity Security Maturity Model can help you identify gaps and plan for improvement in your Identity Security strategy. Read this paper to learn more and find your place in the model.
Posted: 24 Mar 2023 | Published: 24 Mar 2023

TOPICS:  IT Management
CyberArk