Fiber to the Curb Reports

Computer Weekly – 17 November 2015: How Taiwan is building the internet of things
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we meet the Taiwanese companies that are developing the technology building blocks for the internet of things. Our latest buyer's guide looks at the skills needed for modern IT leadership. And we examine the technology options to take superfast broadband speeds even higher. Read the issue now.
Posted: 13 Nov 2015 | Published: 13 Nov 2015

TechTarget ComputerWeekly.com

Infographic: 5 cybersecurity trends for 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
Posted: 16 Jan 2023 | Published: 17 Jan 2023

TechTarget ComputerWeekly.com

Speed Up Your Software Development Cycle
sponsored by Slack
WHITE PAPER: Learn how to accelerate coding and deliver more software faster.
Posted: 20 Dec 2023 | Published: 20 Dec 2023

TOPICS:  IT Management
Slack

Computer Weekly – 4 April 2023: Revitalising UK digital government
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK plummets down the international rankings for digital government, can its £400m identity system revitalise the UK's digital strategy? Read the issue now.
Posted: 03 Apr 2023 | Published: 04 Apr 2023

TechTarget ComputerWeekly.com

Computer Weekly – 22 November 2022: Cyber criminals target World Cup Qatar 2022
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the FIFA World Cup opens in Qatar, we examine the cyber security threats from criminals targeting the event. We report from the Gartner Symposium on the latest predictions for enterprise software development. And we talk to the CIO of Kyiv City Council about managing IT in the shadow of war. Read the issue now.
Posted: 18 Nov 2022 | Published: 22 Nov 2022

TechTarget ComputerWeekly.com

Computer Weekly – 23 May 2023: How to secure your software supply chain
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.
Posted: 19 May 2023 | Published: 23 May 2023

TechTarget ComputerWeekly.com

How Financial Services Leaders are Ramping Up Innovation While Staying Secure
sponsored by Slack
WHITE PAPER: See how Asia-Pacific financial services leaders are combining operational agility with AI-powered productivity while bolstering security and compliance.
Posted: 20 Nov 2023 | Published: 20 Nov 2023

TOPICS:  IT Management
Slack

Computer Weekly – 10 October 2023: Teeing up tech at the Ryder Cup
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes at golf's Ryder Cup to see the tech firsts introduced to improve the fan experience. UK tech leaders explain why they feel 'betrayed' by the government's net-zero policy changes. Read the issue now.
Posted: 10 Oct 2023 | Published: 10 Oct 2023

TechTarget ComputerWeekly.com

Implementing GenAI: Use cases & challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The use cases of generative AI are wide-ranging and have the potential to impact nearly all areas in business and IT. In this e-guide on generative AI, learn how to put the technology to work in business applications, DevOps and IT, as well as manage implementation challenges and risks.
Posted: 07 Feb 2024 | Published: 08 Feb 2024

TechTarget ComputerWeekly.com

Cloud networking vs. Cloud computing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Organizations might sometimes consider cloud computing and cloud networking as interchangeable due to their similarities. But the two strategies have different goals and processes. In this infographic, learn more about the main features, uses and benefits of each of them.
Posted: 22 Nov 2022 | Published: 22 Nov 2022

TechTarget ComputerWeekly.com