Basel Capital Accord Reports

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos

Going big: why companies need to focus on operational analytics
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from Capgemini Consulting shows how the search for competitive advantage has driven organisations to shift the focus of their analytical efforts to back office operations
Posted: 08 Feb 2021 | Published: 27 Sep 2016

TechTarget ComputerWeekly.com

Case Study: Auto Trader UK cuts IT resource use through Google Cloud, Kubernetes and Istio adoption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Auto Trader is the UK's biggest online marketplace for new and used car sales. Its head of infrastructure sets out how cloud, containers and microservices will help reinforce its market-leading position in the years to come
Posted: 08 Feb 2021 | Published: 09 May 2019

TechTarget ComputerWeekly.com

MSP Business Model and Financial Lessons Learned in Pandemic
sponsored by Hyland Software
EGUIDE: In this guide, get insight into how industry experts think the pandemic affected the IT services industry, where government assistance could and could not help, and what's been learned over the last few months. Experts also provide tips to help keep MSPs in business now and in the future. Take a brief survey to download your copy.
Posted: 27 Sep 2021 | Published: 27 Sep 2021

Hyland Software

Stronger collaboration platforms emerge as pandemic legacy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: HR software had long been a relatively backward zone of enterprise software before the Covid-19 pandemic. It had been catching up, as organisations applied digital approaches drawn from customer experience to employee experience, encompassing the journey from recruitment, through working and learning, to moving up or moving on.
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

Financial applications automation – promise is real but needs business nous
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The automation of the financial software that lies at the heart of any business – accountancy, budget management, general ledger, payroll, and so on – is a prize many organisations are eyeing up, with machine learning and robotic process automation close to mind. Find out everything you need to know by downloading this PDF E-Guide.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

TechTarget ComputerWeekly.com

Transforming Into Senior Digital Business Executives
sponsored by Gartner
WEBCAST: Tune in to this informative webcast to learn how you can make the most out of your role as CIO or IT manager and refocus your efforts on adding real business value to you enterprise. Click on the link and stream this informative webcast from the experts at Gartner to find out more.
Posted: 03 Jul 2014 | Premiered: Jul 3, 2014

Gartner

ITSM at Breakneck Speed
sponsored by TechTarget CIO
EBOOK: It's a brave new world for IT service management. Managing IT services today requires CIOs to keep up with cloud, mobile and users' insistence on self-service IT. This SearchCIO handbook, CIO contributor Harvey Koeppel explains why you should revamp your ITSM strategies.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

TechTarget CIO

MicroScope E-Zine April 2015
sponsored by MicroScope
EZINE: In this issue, we look at how employers can check staff criminal records and get industry views on the progress of the partnership between IBM and Apple.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

MicroScope

CW Europe – October 2014 Edition
sponsored by TechTarget ComputerWeekly.com
EZINE: BYOD policies: What's allowed and what's banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

TechTarget ComputerWeekly.com