Secure Copyright Protection Reports

Computer Weekly – 13 April 2021: The evolution of RPA
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide looks at the future of robotic process automation (RPA). Google's legal victory against Oracle over the use of Java APIs has huge significance for software developers. And we find out how expectations of IT have grown as firms prepare for the post-Covid workplace. Read the issue now.
Posted: 12 Apr 2021 | Published: 13 Apr 2021

TechTarget ComputerWeekly.com

Generative AI ethics: 8 biggest concerns and risks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Generative AI is upending business models and forcing ethical issues like customer privacy, brand integrity and worker displacement to the forefront. These risks require a clearly defined strategy, good governance and a commitment to responsible AI. A corporate culture that embraces generative AI ethics must consider these eight important issues.
Posted: 06 Nov 2023 | Published: 07 Nov 2023

TechTarget ComputerWeekly.com

Computer Weekly – 19 July 2016
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.
Posted: 08 Feb 2021 | Published: 19 Jul 2016

TechTarget ComputerWeekly.com

Computer Weekly – 22 January 2019: Moving beyond network boundaries
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.
Posted: 08 Feb 2021 | Published: 18 Jan 2019

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to NoSQL
sponsored by TechTarget ComputerWeekly.com
EBOOK: There's a lot of data out there, much of which doesn't need to be stored in heavyweight relational databases complete with complex query languages. In this 13-page buyer's guide, Computer Weekly looks at a new category of NoSQL data stores and how they are being used.
Posted: 08 Feb 2021 | Published: 28 Jul 2016

TechTarget ComputerWeekly.com

CW Innovation Awards: DBS Bank Project of the Year Interview [Video]
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this interview, Soumya Ghoshal, managing director, middle office technology, technology and operations, explains DBS Bank's credit architecture program, how it has freed up more time for relationship managers through automation, and the bank's general approach to innovation.
Posted: 03 Jun 2021 | Published: 04 Jun 2021

TechTarget ComputerWeekly.com

Computer Weekly – 15 September 2015: Opening Doors to Open Source
sponsored by TechTarget ComputerWeekly.com
EZINE: This expert guide examines the growing open source software movement, as well as emerging best practices in next-generation service management. Read this resource to also find out how organizations should be preparing for the forthcoming changes to EU data protection laws.
Posted: 14 Sep 2015 | Published: 14 Sep 2015

TechTarget ComputerWeekly.com

How to Overcome Middleware Security Risks
sponsored by Red Hat
EGUIDE: This expert e-guide provides a step-by-step process to secure middleware through application lifecycle management, network security, and security for specific middleware tools and interfaces. Also discover a case study about how the FAA exploited web-oriented open source middleware to improve integration and cut costs.
Posted: 26 Feb 2016 | Published: 22 Feb 2016

Red Hat

A Case for IT Security: The Future of New EU Data Protection
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

TechTarget ComputerWeekly.com

Reinvigorate BPM Strategies For Continuous Efficiencies
sponsored by Red Hat
EGUIDE: In this e-guide, experts address how to realign existing BPM strategies to enforce quality employee performance. In addition, discover key tips on how to leverage the power of open source BPM.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

Red Hat