Information Technology Governance Reports

CW Europe – March 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: Cities in continental Europe will be eyeing opportunities to attract more startup firms in view of the potential scenario that London and the UK more widely might lose their appeal to entrepreneurs after Brexit.
Posted: 08 Feb 2021 | Published: 08 Mar 2018

TechTarget ComputerWeekly.com

CW Benelux November 2019-January 2020: Dutch banks fight money laundering
sponsored by TechTarget ComputerWeekly.com
EZINE: Dutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.
Posted: 08 Feb 2021 | Published: 31 Oct 2019

TechTarget ComputerWeekly.com

CW Europe December 2019: Deutsche Bank creates innovation division
sponsored by TechTarget ComputerWeekly.com
EZINE: German investment banking giant Deutsche Bank is opening a division focused on innovation as part of its plan to digitise all business operations. Read more details in this edition of CW Europe.
Posted: 08 Feb 2021 | Published: 12 Dec 2019

TechTarget ComputerWeekly.com

First edition of Computer Weekly 1966
sponsored by TechTarget ComputerWeekly.com
EBOOK: To celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.
Posted: 08 Feb 2021 | Published: 09 Sep 2016

TechTarget ComputerWeekly.com

CW Europe – December 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 08 Feb 2021 | Published: 13 Dec 2018

TechTarget ComputerWeekly.com

Focus: Infosec17
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
Posted: 08 Feb 2021 | Published: 19 Jun 2017

TechTarget ComputerWeekly.com

Working with the Kubernetes Configuration to Deploy Containers
sponsored by Diamanti
EGUIDE: In this expert guide, Alan Earls, contributor to SearchITOperations.com, walks you through using the Kubernetes configuration for container deployment. Inside, you'll find expert instruction on properly applying Kubernetes' nodes, pods, schedulers, and volumes to bypass orchestration challenges, and more.
Posted: 27 Feb 2018 | Published: 19 Feb 2018

Diamanti

How to Maintain a Firm Grip on Technical Asset Management
sponsored by Livingstone Group
EGUIDE: Read this expert guide from ComputerWeekly.com to learn how to maintain a firm grip on your technical asset management and to resolve any lack of visibility before it becomes a business issue.
Posted: 08 Feb 2021 | Published: 08 Jul 2020

Livingstone Group

Full-Stack Monitoring, Explained
sponsored by ServiceNow
EGUIDE: Read this E-Guide to learn how to determine what areas of your infrastructure necessitate a more advanced monitoring solution to get the insights your DevOps teams need -- and learn how to get closer to true full-stack monitoring capabilities.
Posted: 30 Jan 2020 | Published: 30 Jan 2020

ServiceNow

Where's the Collaboration in Enterprise Collaboration Tools?
sponsored by TechTarget Content Management
EGUIDE: Enterprise collaboration tools can help generate sales, reduce costs and connect dispersed workers. So why are many companies hesitant to use them? In this e-guide, you'll ensure strong governance policies are at the heart of your enterprise-wide collaboration strategy and learn the secrets of collaboration success.
Posted: 03 Mar 2016 | Published: 02 Mar 2016

TechTarget Content Management