Supervisory Control and Data Acquisition Reports

Information Security Ezine- Europe
sponsored by TechTarget ComputerWeekly.com 
EZINE: This e-zine presented by SearchSecurity.co.UK will give key tips on how to comply to data protection regulations, and will help you find a product that is right for your business.
Posted: 02 Jun 2011 | Published: 02 Jun 2011

TechTarget ComputerWeekly.com 

IBM Service Management for the Intelligent Utility Network
sponsored by IBM
WHITE PAPER: The current utilities environment requires companies to decrease costs while increasing the ability to control utility assets. One key challenge is how to take advantage of new technologies to better manage the delivery of service to customers today and into the future. IBM Service Management for the IUN provides a blueprint for getting started.
Posted: 06 Dec 2010 | Published: 06 Dec 2010

IBM

E-Book: NERC Compliance
sponsored by TechTarget Security
EBOOK: SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.
Posted: 24 Sep 2010 | Published: 24 Sep 2010

TechTarget Security

EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture
sponsored by Globalscape
WHITE PAPER: This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.
Posted: 06 Mar 2014 | Published: 31 Dec 2012

Globalscape

API Management: The role of APis in digital business transformation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.
Posted: 08 Feb 2021 | Published: 09 Nov 2020

TechTarget ComputerWeekly.com

CW Benelux - August-October 2022: Belgium seeks top tech talent
sponsored by TechTarget ComputerWeekly.com
EZINE: The battle for the right IT staff to transform businesses is changing and recruiters and job-seekers need to be clued up. In this issue, a Belgium-based recruiter gives the lowdown on tech job-seeking. Also read why Dutch beer brewer Heineken has replaced more than 60 different HR systems with SAP SuccessFactors as its central HR system.
Posted: 28 Jul 2022 | Published: 11 Aug 2022

TechTarget ComputerWeekly.com

CW Europe - March-May 2022: Luxembourg sees big role in global fintech market
sponsored by TechTarget ComputerWeekly.com
EZINE: Read about Luxembourg's aim to play a larger role in the rapidly growing global financial technology market. Also find out how a Siri-like digital assistant will automate the completion of government service requests in Estonia.
Posted: 28 Feb 2022 | Published: 10 Mar 2022

TechTarget ComputerWeekly.com

Computer Weekly - 29 November 2022: How to stop data retention from killing the planet
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.
Posted: 28 Nov 2022 | Published: 29 Nov 2022

TechTarget ComputerWeekly.com

Computer Weekly – 7 March 2023: Can the UK keep its fintech crown?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, two years after the Kalifa report laid out a roadmap for continued fintech sector growth, UK entrepreneurs and startups are worried about the lack of progress. We look at the top tech trends in retail and find out which companies are leading the way. And we examine six ways to slash IT emissions. Read the issue now.
Posted: 06 Mar 2023 | Published: 07 Mar 2023

TechTarget ComputerWeekly.com

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TechTarget ComputerWeekly.com