Online Recreational Services Reports

Computer Weekly - 22 February 2022: Think nation-state cyber attacks won't hit you? Think again...
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with Russian state cyber attacks in the news, we find out why security professionals in every organisation need to remain alert. Our buyer's guide looks at the tools and programmes helping improve IT training. And we look at how the traditional sport of golf is undergoing a digital transformation. Read the issue now.
Posted: 21 Feb 2022 | Published: 22 Feb 2022

TechTarget ComputerWeekly.com

The Human Face of Big Data: Data Driven
sponsored by TechTarget ComputerWeekly.com
BOOK: Software engineers are transforming the daily lives of hundreds of millions of people for good and for ill, writes Jonathan Harris.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

TechTarget ComputerWeekly.com

Computer Weekly - 14 December 2021: The rules for a safer internet
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.
Posted: 12 Dec 2021 | Published: 14 Dec 2021

TechTarget ComputerWeekly.com

Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud
sponsored by iovation, Inc.
CASE STUDY: Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

CW Nordics - November 2021-January 2022: Could Iceland be the best place in the world for HPC?
sponsored by TechTarget ComputerWeekly.com
EZINE: Most of Iceland's cheap, sustainable energy is used by aluminium smelters, but the country's Landsvirkjun power company is now promoting other uses for it, including high-performance computing. Also read in this issue how IoT collaboration in Norway is reaching beyond industries such as mining and shipping to include fish farming.
Posted: 15 Nov 2021 | Published: 25 Nov 2021

TechTarget ComputerWeekly.com

Dropbox Cuts Its Procurement Cycle By 50% And Counting, With Genpact And ServiceNow
sponsored by ServiceNow and Genpact
CASE STUDY: Dropbox cut its procurement cycle time by over 50% by adopting ServiceNow and partnering with Genpact for consulting and implementation. Read this case study to see how this company replaced disconnected, manual processes with a streamlined, automated system providing transparency and efficiency.
Posted: 08 Apr 2024 | Published: 08 Apr 2024

ServiceNow and Genpact

The Essential IT Automation Success Checklist
sponsored by Red Hat
PRODUCT OVERVIEW: Automation is a top business initiative for 60% of organizations. In this product overview, discover 5 ways you can use Red Hat Ansible Automation Platform to simplify your company’s automation management efforts.
Posted: 22 Apr 2024 | Published: 22 Apr 2024

Red Hat

2021 UKI Media Consumption Infographic: Digital research preferences
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this infographic, we take a look at the impact of the pandemic on IT purchasing in the UKI region and analyse the best marketing and sales approaches for prospect outreach on the new 'digital' normal.
Posted: 13 Jan 2022 | Published: 13 Jan 2022

TechTarget ComputerWeekly.com

A Proactive Approach To Field Service 5 Priorities For Implementing Strong Service Foundations
sponsored by ServiceNow
EBOOK: This report explores transitioning from reactive to proactive field service model, highlighting 5 priorities. Read on to understand them and to see how ServiceNow enhances operations by connecting teams, streamlining tasks, and empowering customers with its platform and Field Service Management app.
Posted: 22 Feb 2024 | Published: 22 Feb 2024

ServiceNow