Computer Associates Unicenter Reports

The Ultimate Guide to Enterprise Content Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Enterprise Content Management (ECM) has rapidly evolved as different forms of content have been introduced to the work environment. In this guide, find out how ECM works, why it is so important, the key components and benefits, and what to look for when choosing ECM software.
Posted: 05 Oct 2022 | Published: 05 Oct 2022

TechTarget ComputerWeekly.com

The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 08 Feb 2021 | Published: 29 Jul 2016

TechTarget ComputerWeekly.com

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TechTarget ComputerWeekly.com

Computer Weekly – 17 October 2017: Microsoft CEO Satya Nadella on empathy and innovation
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this week's Computer Weekly, Microsoft CEO Satya Nadella explains why he has made empathy a key part of technology innovation. We examine the latest news in the ongoing debate over the tax status of IT contractors in the public sector. And we ask if an emphasis on creativity will help attract more young people to work in IT. Read the issue now.
Posted: 08 Feb 2021 | Published: 13 Oct 2017

TechTarget ComputerWeekly.com

Computer Weekly – 18 June 2019: Applying AI to road safety
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit a Tokyo project where artificial intelligence is helping to improve road safety by detecting potential subsidence. As bug bounty programmes become popular, we look at what's involved and the pitfalls to beware. And we discuss digital development in healthcare with NHS England. Read the issue now.
Posted: 08 Feb 2021 | Published: 18 Jun 2019

TechTarget ComputerWeekly.com

CW ASEAN: Unlock flash opportunities
sponsored by TechTarget ComputerWeekly.com
EZINE: Traditional disks can no longer keep up with the needs of modern enterprises. In this issue of CW ASEAN, we take a look at how enterprises are taking to all-flash array storage, and what they need to do to lay the foundation necessary for getting the most out of the technology. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Oct 2018

TechTarget ComputerWeekly.com

CW@50: March editions of Computer Weekly
sponsored by TechTarget ComputerWeekly.com
EZINE: We search back through the Computer Weekly archives held at The National Museum of Computing to present what was happening in IT over the past five decades.
Posted: 08 Feb 2021 | Published: 15 Mar 2016

TechTarget ComputerWeekly.com

Raspberry PI with Java: programming the internet of things
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
Posted: 08 Feb 2021 | Published: 27 Sep 2016

TechTarget ComputerWeekly.com

Why, and how, to merge your SD-WAN and security strategies
sponsored by TechTarget Networking
EGUIDE: SD-WAN has been linked to security from its inception, but what if you could go one step further? What if there were ironclad ways to manage threats, trust, visibility and orchestration to give your organization an added layer of security through SD-WAN? In this handbook, read more about piecing together SD-WAN and security.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

TechTarget Networking

Analyst Report - Vendor Comparison for Integrated Quality Suite
sponsored by IBM
ANALYST REPORT: According to Gartner, vendors must demonstrate both "completeness of vision" and an "ability to execute" to be evaluated as a leader. Gartner's 2011 Magic Quadrant for Integrated Software Quality Suites evaluates IBM as a leader. Read the report to learn more.
Posted: 08 Feb 2021 | Published: 02 Sep 2011

IBM