Biological Weapons Reports

UKTech50 2021 - The most influential people in UK technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Computer Weekly has announced the 11th annual UKtech50, our definitive list of the movers and shakers in UK technology – the CIOs, industry executives, public servants and business leaders driving the role of technology in the UK economy.
Posted: 15 Mar 2021 | Published: 08 Mar 2021

TechTarget ComputerWeekly.com

Europe's controversial digital vision for the next decade
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the European Parliament's digital vision for the next decade, including controversial plans for a regional internet. GDPR is two years old – we find out how well the law is working. And we look at how the coronavirus crisis is affecting digital skills recruitment and training.
Posted: 08 Feb 2021 | Published: 16 Jun 2020

TechTarget ComputerWeekly.com

Computer Weekly – 7 November 2023: How ExxonMobil is leading with data
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the leader of ExxonMobil's data organisation, about the energy giant's strategy to establish enterprise-wide principles for the use of data. As the UK's Online Safety Act comes into force, we examine the tech sector's concerns over the laws around end-to-end encryption. Read the issue now.
Posted: 06 Nov 2023 | Published: 07 Nov 2023

TechTarget ComputerWeekly.com

Declaration by David Godkin producing 212 sealed exhibits - 16 May 2018
sponsored by TechTarget ComputerWeekly.com
RESOURCE: The exhibits produced in this declaration by David Godkin, counsel for app developer Six4Three, contain internal Facebook communications, including emails between CEO Mark Zuckerberg and senior executives, correspondence and chat-logs, spreadsheets and strategy presentations.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

EMA Analyst Report: Enabling Real-World Business Transformation through IBM Service Management
sponsored by IBM
INFORMATION CENTER: Visit this information center and find out how smarter technology can result in gains in efficiency, business alignment and risk management strategies.
Posted: 05 Oct 2009 | Published: 01 Oct 2009

IBM

Web Threats 2010: The Risks Ramp Up
sponsored by CSC
WHITE PAPER: In the face of unprecedented web threat level growth, CSC CloudProtection for Mail and Web delivers protection of the very highest quality for thousands of businesses worldwide. Read this white paper to learn more about today's web threats and how your business can protect itself against them comprehensively and cost-effectively.
Posted: 17 Nov 2010 | Published: 17 Nov 2010

CSC

Storage strategies for the health IT professional
sponsored by EMC Isilon
PRESENTATION TRANSCRIPT: In this presentation transcript, Marc Staimer, president of Dragon Slayer Consulting, describes the basics of tiered storage architecture and demonstrates how health care organizations can set policies to automate the process of moving data to different tiers.
Posted: 31 Aug 2012 | Published: 31 Aug 2012

EMC Isilon

Achieving Value in Healthcare Through Efficiency and Effectiveness
sponsored by DellEMC and Intel®
WHITE PAPER: this white paper demonstrates how, by reforming health care delivery, implementing appropriate technology, and reshaping the medical establishment which supports efficiency and effectiveness, America can provide the best value in health care services for its citizens.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

DellEMC and Intel®

Using ICD-10 Codes and Electronic Health Records to Achieve Value
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper demonstrates how adopting ICD-10 and EHRs can provide information that would be useful to streamlining administrative burdens that plague both health plans and providers.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

DellEMC and Intel®

Networking Compliance
sponsored by DellEMC and Intel®
WHITE PAPER: This paper presents a broad overview of the major types of compliance required today. In addition, it considers an approach to compliance based on the network as a whole, rather than on specific devices or areas.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

DellEMC and Intel®