Bar Code Labeling Software Reports

The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 08 Feb 2021 | Published: 29 Jul 2016

TechTarget ComputerWeekly.com

Computer Weekly – 27 November 2018: Software patching at scale – how to make it work
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at one of the oldest pain points for IT departments – software patching – and ask how to make it less complex across the enterprise. We examine the rise of Kubernetes, the open source container system. And we look at storage strategy to support a multicloud environment. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Nov 2018

TechTarget ComputerWeekly.com

Using IT initiatives to save money and reinforce green credentials
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: Analyst Group Quocirca explains how organisations can use web data caching software to save money and improve their green credentials.
Posted: 08 Feb 2021 | Published: 05 Jan 2017

TechTarget ComputerWeekly.com

Computer Weekly - 19 November 2019: Is facial recognition happening too fast?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.
Posted: 08 Feb 2021 | Published: 19 Nov 2019

TechTarget ComputerWeekly.com

Application security: More important than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 08 Feb 2021 | Published: 11 Jun 2018

TechTarget ComputerWeekly.com

Infographic: 2019 IT Priorities - Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic, we shine a light on our 2019 IT Priorities survey results. Discover what IT departments are investing in and how much budgets are increasing by. Taken from a study of 151 respondents from across Middle East.
Posted: 08 Feb 2021 | Published: 09 Jul 2019

TechTarget ComputerWeekly.com

Application Delivery Network Buyer's Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

Key Microsoft Azure App Service Features for Cloud Development
sponsored by Microsoft, Intel, SAP
EGUIDE: In this expert e-guide, we explore how to simplify your cloud app experience with technologies like Azure. Find out how to improve cloud development initiatives, and delve down into topics like cloud services for serverless computing, AI, and containers.
Posted: 02 Jan 2018 | Published: 29 Dec 2017

Microsoft, Intel, SAP

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

CW EMEA - January 2023: Protecting the privacy of schoolchildren
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.
Posted: 11 Jan 2023 | Published: 12 Jan 2023

TechTarget ComputerWeekly.com