Recreational Services Reports

Computer Weekly - 22 February 2022: Think nation-state cyber attacks won't hit you? Think again...
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with Russian state cyber attacks in the news, we find out why security professionals in every organisation need to remain alert. Our buyer's guide looks at the tools and programmes helping improve IT training. And we look at how the traditional sport of golf is undergoing a digital transformation. Read the issue now.
Posted: 21 Feb 2022 | Published: 22 Feb 2022

TechTarget ComputerWeekly.com

The Human Face of Big Data: Data Driven
sponsored by TechTarget ComputerWeekly.com
BOOK: Software engineers are transforming the daily lives of hundreds of millions of people for good and for ill, writes Jonathan Harris.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

TechTarget ComputerWeekly.com

Computer Weekly - 14 December 2021: The rules for a safer internet
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.
Posted: 12 Dec 2021 | Published: 14 Dec 2021

TechTarget ComputerWeekly.com

Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud
sponsored by iovation, Inc.
CASE STUDY: Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

India IT Priorities 2022: Top Observations & Trends
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Inside this report, read more about the findings from the 2022 TechTarget/Computer Weekly's IT priorities study, as well as insights on how Indian enterprises are directing their IT investments and what are the main observations and trends for India in 2022.
Posted: 19 Jan 2022 | Published: 19 Jan 2022

TechTarget ComputerWeekly.com

CHAPTER 15: Working with the Command-Line Interface
sponsored by McGraw Hill
BOOK: Download this free chapter from ITF+ CompTIA IT Fundamentals to learn how to work with and decipher the command line interface, demonstrate fundamental commands and more.
Posted: 08 Feb 2021 | Published: 13 Jan 2021

McGraw Hill

CW Europe - March-May 2022: Luxembourg sees big role in global fintech market
sponsored by TechTarget ComputerWeekly.com
EZINE: Read about Luxembourg's aim to play a larger role in the rapidly growing global financial technology market. Also find out how a Siri-like digital assistant will automate the completion of government service requests in Estonia.
Posted: 28 Feb 2022 | Published: 10 Mar 2022

TechTarget ComputerWeekly.com

4 IT Automation Myths Dispelled
sponsored by Red Hat
EBOOK: Read this e-book to learn how to overcome practical barriers to holistic automation adoption within your organization. Coverage includes automation goal setting, common myths, how to unite teams and training, and scaling automation across the business.
Posted: 22 Apr 2024 | Published: 22 Apr 2024

Red Hat

CW Nordics - May-July 2021: Denmark takes a top-down approach to gender equality in tech entrepreneurship
sponsored by TechTarget ComputerWeekly.com
EZINE: Tech Nordic Advocates has adopted a new approach to closing the gender gap in Danish technology startups, looking to emulate Canada's top-down approach.
Posted: 17 May 2021 | Published: 27 May 2021

TechTarget ComputerWeekly.com