Controlled Vocabularies Reports

8 electronic signature best practices to build in to your workflow
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Here are 8 tips to think about when creating an e-signing process include cataloging documents requiring signatures, building user stories and determining necessary software features.
Posted: 12 Jul 2023 | Published: 13 Jul 2023

TechTarget ComputerWeekly.com

Computer Weekly – 19 December 2017: Navigating through digital change
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, IT leaders share the lessons learned and discuss best practice in digital transformation. We find out how SAP is addressing customer concerns about its indirect licensing policies. And we assess whether SME IT suppliers are making headway in selling to government CIOs. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Dec 2017

TechTarget ComputerWeekly.com

Object Storage 101
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.
Posted: 08 Feb 2021 | Published: 07 Feb 2017

TechTarget ComputerWeekly.com

CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa
sponsored by TechTarget ComputerWeekly.com
EZINE: Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?
Posted: 14 Mar 2022 | Published: 16 Mar 2022

TechTarget ComputerWeekly.com

How TDCX is building a people-centric business
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Every digital tool deployed by TDCX is aimed at augmenting the performance and experience of its employees. In an interview with CW, Byron Fernandez, group CIO of TDCX, talks up the company's approach in ensuring its technology investments enhance employee experience, as well as the cyber security challenges in its human capital intensive business.
Posted: 06 Jul 2022 | Published: 06 Jul 2022

TechTarget ComputerWeekly.com

MicroScope September Ezine
sponsored by MicroScope
EZINE: For many, the looming Brexit has stalled IT purchasing all together. But what can your organisation do to counteract this and navigate the complicated matter better than your peers? What does it mean for your employees? Take a look at this article of MicroScope for more information on Brexit's effect on the IT industry.
Posted: 25 Aug 2017 | Published: 25 Aug 2017

MicroScope

Cost-Benefit Analysis: Comparing Key Players for Structured Analytics
sponsored by IBM
WHITE PAPER: Can your organization implement Hadoop clusters without being crippled by IT costs? This resource considers two major players offering structured analytics. Access now to see each of their cost-benefit results and discover the best choice for your business.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

IBM

BYOD Compliance: Keep Mobile Data Regulation-Ready
sponsored by TechTarget Security
EBOOK: In this SearchCompliance handbook, learn cutting-edge BYOD compliance strategies to keep mobile data secure and compliant with regulations.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

TechTarget Security

Computer Weekly – 17 June 2014: The Met Office turns to open source
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out why the Met Office turned to an open source database to replace Oracle at the UK weather forecasting service. We take an in-depth look at Microsoft's SQL Server 2014 release. And we analyse the revolutionary potential of cloud computing. Read the issue now.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

TechTarget ComputerWeekly.com

Mom, Apple Pie, and the Office of Comptroller of the Currency
sponsored by Iron Mountain
WHITE PAPER: Consult the following white paper to learn about the new OCC update to governance ruling. Uncover a solid footing on how to assess each vendor, calculate the risk management life cycle, and how you can successfully plan ahead for these changes.
Posted: 05 Jun 2014 | Published: 19 Feb 2014

Iron Mountain