eTransactions Reports

Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men's support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now.
Posted: 09 May 2022 | Published: 10 May 2022

TechTarget ComputerWeekly.com

Computer Weekly – 19 December 2023: The ransomware threat to UK critical infrastructure
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, a parliamentary report warns that a lack of ransomware preparedness at the highest levels of government is leaving UK critical national infrastructure dangerously exposed – we analyse the risks. We also examine how AI tools are helping to enhance cloud security. Read the issue now.
Posted: 18 Dec 2023 | Published: 19 Dec 2023

TechTarget ComputerWeekly.com

10 common uses for machine learning applications in business
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Machine learning (ML) enables businesses to perform tasks on a scale previously thought impossible. As a result, many organizations are finding ways to harness ML to not just drive efficiencies but to fuel new business opportunities. Here are 10 applications of ML that are being used to solve problems & deliver tangible business benefits:
Posted: 09 Feb 2023 | Published: 09 Feb 2023

TechTarget ComputerWeekly.com

Computer Weekly – 11 August 2015: Data unlocks personalised customer service
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine how companies are starting to use big data analytics to deliver more personalised customer services. We talk to the government's IT procurement chief about improving public sector tech purchasing. And Volvo's CIO tells us how connected cars will reshape the automotive sector. Read the issue now.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

TechTarget ComputerWeekly.com

Presentation Transcript: Service as an Infrastructure: Looking at Enterprise Clouds in a Different Way
sponsored by Eucalyptus Systems
PRESENTATION TRANSCRIPT: Eucalyptus co-founder & CTO Rich Wolski discusses "Services as an Infrastructure" as a way in which enterprises can architect production cloud computing environments. Explore deployment strategies based on user experiences with private clouds in various enterprise settings and learn about likely future technological developments.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

Eucalyptus Systems

Empowered Customers Drive Collaborative Business Evolution
sponsored by IBM
WHITE PAPER: Read this groundbreaking new study, conducted by Forrester Consulting on behalf of IBM, to understand how empowered customers are changing the way business is doing business—today and in the future.
Posted: 13 Aug 2012 | Published: 31 May 2012

IBM

Streamlining WebLogic Server Domain Implementation
sponsored by Oracle Corporation
SOFTWARE DEMO: What options exist to help simplify WebLogic server domain setup, and the ensuing traffic? This video product demonstration dives into one platform that promises to streamline the WebLogic server domain setup. Handle your cloud e-commerce setup with minimal cost and effort.
Posted: 11 Nov 2015 | Premiered: 11 Nov 2015

Oracle Corporation

On Demand Webcast: Elaine Turner Extends Her Reach with Commerce Cloud Platform
sponsored by Oracle Corporation
WEBCAST: Watch now to hear Elaine Turner's Director of ecommerce, Carrie Leader, discuss key strategies for building an ecommerce business as a branded manufacturer. Learn how Elaine Turner used a Cloud ecommerce platform to create a new destination site where visitors can research, buy, or engage with the brand to support sales in all channels.
Posted: 27 Jan 2016 | Premiered: Dec 15, 2015

Oracle Corporation

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

One Click Away: Where Does the Data Come From?
sponsored by LANSA
WHITE PAPER: Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

LANSA