Disposal Reports

CW Middle East Jan to Mar 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: The Middle East is investing heavily in IT to make life better for its population. Smart city developments are an example. But read in this issue how in the Middle East, where there is a growing population and a rise in lifestyle-related disease, IT is being used to support the healthcare system.
Posted: 08 Feb 2021 | Published: 11 Jan 2018

TechTarget ComputerWeekly.com

CW Benelux ezine February 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: In this quarter's CW Benelux ezine, we ask whether the Netherlands is suffering from digital delusion and if it is losing ground in the digital world.
Posted: 08 Feb 2021 | Published: 09 Feb 2017

TechTarget ComputerWeekly.com

CW@50: What was making the news in June
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
Posted: 08 Feb 2021 | Published: 03 Jun 2016

TechTarget ComputerWeekly.com

Integrating the Finance organization for global business: Important implications for CIOs
sponsored by IBM
WHITE PAPER: This paper looks at the growing alignment between the financial and technical disciplines. It examines the results of the Global CFO Study 2008 in the context of IT, identifying the critical implications for CIOs, and the need for a strategic partnership with CFOs and more ongoing collaboration between Finance and IT.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

Business Benefits of a Shared Vision between CIOs and Line of Business Executives
sponsored by EMC Corporation
WHITE PAPER: Get in-depth insights from a new global survey of executives by The Economist Intelligence Unit, which confirms significant change in how organizations like yours deliver and use IT services, and advocates a blended model of internal and third-party services.
Posted: 30 May 2014 | Published: 30 May 2014

EMC Corporation

Informix Active Clustering E-Book
sponsored by IBM
EBOOK: Read this e-book for an exploration of the four advantages of clustering, including data redundancy and parallel processing, and such benefits as high availability, rapid scalability, flexibility and maximum resource utilization.
Posted: 23 Aug 2010 | Published: 07 Jun 2010

IBM

Strategize IT Budget and Infrastructure Planning to Secure DevOps Pipelines
sponsored by Red Hat
EGUIDE: Learn how to implement a collaborative, lightweight ITIL approach in your infrastructure, and adapt ITIL to suit your priorities by unifying ITSM and DevOps under one framework. Download now to keep a close eye on DevOps pipelines by strategizing your budget to secure container initiatives, and more.
Posted: 02 Feb 2017 | Published: 31 Jan 2017

Red Hat

Creating and Managing value with IBM Tivoli Service Management center for System z
sponsored by IBM
WHITE PAPER: Read this paper to learn about a service management solution that's optimized for IBM's System z, but compatible with other distributed systems, that provides the end-to-end visibility, control and automation for optimum business service delivery and IT infrastructure management.
Posted: 14 Feb 2012 | Published: 30 Apr 2008

IBM

Citrix Mobile Solutions Bundle - Product Overview
sponsored by Citrix Systems, Inc.
WHITE PAPER: Read on and learn more about an integrated approach to mobile device management that can provide comprehensive IT control and policy enforcement while empowering end-user productivity via beautifully delivered mobile applications.
Posted: 14 Jun 2013 | Published: 06 Jun 2013

Citrix Systems, Inc.

Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response
sponsored by Xerox
EGUIDE: In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.
Posted: 20 Oct 2016 | Published: 19 Oct 2016

Xerox