Defrag Reports

8 key characteristics of cloud computing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: When it comes to building and deploying modern applications, companies rely on the cloud. From the ability to manage automation, costs, performance, compliance, and security, cloud provides flexibility that sets it apart from on-premises IT architectures. In this e-guide, explore the 8 key characteristics of cloud computing.
Posted: 07 Aug 2023 | Published: 08 Aug 2023

TechTarget ComputerWeekly.com

Video: IT Priorities 2023 APAC
sponsored by TechTarget ComputerWeekly.com
VIDEO: Over half of respondents in this year's IT Priorities study have bigger IT budgets as they continue to make strategic investments in cyber security, cloud and automation. In this video, hear from TechTarget's APAC editor in chief on the top priorities of organisations and the major tech trends that are shaping IT buying decisions in the region.
Posted: 30 Mar 2023 | Premiered: 30 Mar 2023

TechTarget ComputerWeekly.com

Get the Greatest ROI From Your Strategic Initiatives
sponsored by ServiceNow
WHITE PAPER: The most effective way to thrive through unprecedented change is to get ahead of it. Read this e-book to learn how you can transform your digital operations and maximize ROI by enabling effective project and portfolio management on a single platform.
Posted: 18 Jan 2024 | Published: 18 Jan 2024

TOPICS:  IT Management
ServiceNow

Computer Weekly – 19 September 2023: Securing Eurovision's online voting system against cyber attacks
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we discover how Once.net and Cloudfare defended the 2023 Eurovision Song Contest against cyber attacks. Our buyer's guide continues to look at integrating software-as-a-service applications, with the governance of SaaS connectivity to the fore. Read the issue now.
Posted: 15 Sep 2023 | Published: 19 Sep 2023

TechTarget ComputerWeekly.com

Identity Security: Why it Matters and Why Now
sponsored by CyberArk
WHITE PAPER: It is no longer a question of if an organization will be hit by a cyber attack but a question of when. Read this paper to learn why Identity Security could be the key factor in preventing cyber attacks from happening.
Posted: 24 Mar 2023 | Published: 24 Mar 2023

TOPICS:  IT Management
CyberArk

CW APAC: Tech career guide – women in IT
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on tech careers for women in the Asia-Pacific region, Computer Weekly looks at what can be done to attract more women into software development.
Posted: 13 Dec 2022 | Published: 15 Dec 2022

TechTarget ComputerWeekly.com

Computer Weekly – 5 September 2023: Met Police data platform goes £64m over budget
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal a £64m cost over-run for the Metropolitan Police's new record management system. Our latest buyer's guide looks at the issues around integrating SaaS applications. And a leading flash storage firm says the age of spinning disk drives is almost over – are they right? Read the issue now.
Posted: 01 Sep 2023 | Published: 05 Sep 2023

TechTarget ComputerWeekly.com

The Total Economic Impact™ Of KX Insights
sponsored by KX
WHITE PAPER: Read this paper to learn the total economic impact™ of KX Insights, which will identify the cost, benefit, flexibility, and risk factors that could affect your investment decision.
Posted: 15 Jun 2022 | Published: 15 Jun 2022

TOPICS:  IT Management
KX

Driving Decision-Intelligence at 330kph
sponsored by KX
CASE STUDY: In order to to develop the best car, optimize the performance on race-weekend and evolve faster than their competitors, the BTW Alpine F1 Team needed a way to maximize the potential of their data. Access this case study to learn why the BWT Alpine F1 Team turned to KX to extract more value from their data in a very fast way.
Posted: 15 Jun 2022 | Published: 15 Jun 2022

TOPICS:  IT Management
KX

KX: Safety in Numbers
sponsored by KX
EBOOK: Access this e-book to learn how microsecond-fast, ever-present surveillance is the key to minimizing, mitigating and monetizing banking risk.
Posted: 15 Jun 2022 | Published: 30 Dec 2022

TOPICS:  .NET | IT Management
KX