Web Access Reports

Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Jun 2020

TechTarget ComputerWeekly.com

Computer Weekly – 20 October 2020: Why is IBM splitting in two and what does it mean for CIOs?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, IBM is splitting in two, hiving off its services business to focus on hybrid cloud – we examine what it means for CIOs. Our new buyer's guide looks at how intelligent workload management can cut cloud complexity. And we analyse how getting backup right can help tackle ransomware threats. Read the issue now.
Posted: 08 Feb 2021 | Published: 20 Oct 2020

TechTarget ComputerWeekly.com

Digital Billboard Advertising - New Life for a Classic Medium
sponsored by Motorola Solutions
WHITE PAPER: Read this paper to learn more about the emerging trend of digital billboard advertising and how it can enhance responsiveness, flexibility and profits.
Posted: 02 Mar 2009 | Published: 02 Mar 2009

Motorola Solutions

Exchange Server 2007: What to Expect
sponsored by Global Knowledge
WHITE PAPER: Microsoft Exchange Server 2007 has been designed to meet the tough challenges for a corporate communication solution and provides a rich feature set that users can access through a variety of different interfaces and devices.
Posted: 10 Dec 2008 | Published: 01 Jan 2006

Global Knowledge

What to Do When You Have an IP Address but No Internet Connection
sponsored by Global Knowledge
WHITE PAPER: When we have an IP address but can't connect to the Internet, we need basic troubleshooting skills to verify both connections and configuration. Download this resource to learn about the local network, parts of IP addressing, and DHCP basics for resolving these types of connectivity issues.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge

Delivering Secure Guest Access and Mobile Internet Device (MID) Management with HiveOS 4.0
sponsored by Aerohive Networks
WHITE PAPER: Mobile devices give workers the ability to access critical information anytime, anywhere. Despite the obvious benefits for productivity, network accessibility has also become a serious security concern – especially in the healthcare community. Learn about a cloud-enabled network security approach that helps safeguard confidential patient data.
Posted: 18 Jul 2011 | Published: 18 Jul 2011

Aerohive Networks

Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

TechTarget ComputerWeekly.com

Empowering Cardiologists to Enhance Patient Care
sponsored by GE Healthcare
WHITE PAPER: Read this white paper to learn how a web-based IT system can meet the changing cardiovascular technology paradigm by offering flexible, streamlined functions.
Posted: 06 Feb 2014 | Published: 31 Dec 2011

GE Healthcare

IPv6 Timeline: The Road to a New Protocol
sponsored by Hewlett Packard Enterprise
EGUIDE: This IPv6 timeline lists the major milestones in the history of the protocol, describing how – and why – it became what it is today.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett Packard Enterprise

GFI WebMonitor 2012
sponsored by GFI Software
TRIAL SOFTWARE: Having Internet in the workplace – while a necessary feature – can cause two serious challenges: employee inefficiency and security threats. Rather than revoking Internet privileges, discover how you can properly manage and monitor Internet use, preventing these two issues.
Posted: 09 Mar 2012 | Premiered: 09 Mar 2012

GFI Software