Adaptive Software Reports

Artificial Intelligence: Spotlight on ASEAN
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read about ASEAN's efforts in harnessing AI, the challenges ahead, as well as the rapid developments in the burgeoning field.
Posted: 08 Feb 2021 | Published: 27 Aug 2018

TechTarget ComputerWeekly.com

Computer Weekly – 7 November 2017: The ethics of software development
sponsored by TechTarget ComputerWeekly.com
EZINE: Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.
Posted: 08 Feb 2021 | Published: 03 Nov 2017

TechTarget ComputerWeekly.com

Your guide to the open source universe
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Open source used to be an alternative to commercial off –the-shelf software. Today, the largest commercial software providers are big supporters of open source technologies.
Posted: 08 Feb 2021 | Published: 29 Aug 2017

TechTarget ComputerWeekly.com

A guide to continuous software delivery
sponsored by TechTarget ComputerWeekly.com
EBOOK: Software empowers business strategy. In this e-guide we explore how to deliver new software-powered functionality for continuous business improvement.
Posted: 30 Aug 2022 | Published: 30 Aug 2022

TechTarget ComputerWeekly.com

Application Delivery Network Buyers' Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.
Posted: 15 Mar 2021 | Published: 18 Feb 2021

TechTarget ComputerWeekly.com

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TechTarget ComputerWeekly.com

Computer Weekly – 8 November 2016: The march of the robot workers
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.
Posted: 08 Feb 2021 | Published: 08 Nov 2016

TechTarget ComputerWeekly.com

Blockchain Enterprise Survey: deployments, benefits and attitudes
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Blockchain deployments are rapidly becoming mainstream. Nearly 40% of respondents' companies are deploying blockchain technology, rising to 57% amongst companies with over 20,000 employees. In part, this is due to increased awareness and understanding of what blockchain entails, particularly at Founder/CEO level.
Posted: 08 Feb 2021 | Published: 01 Aug 2017

TechTarget ComputerWeekly.com

Infographic: Zoom vs Teams vs Cisco
sponsored by TechTarget ComputerWeekly.com
EGUIDE: While all video conferencing tools perform broadly similar tasks, there are certain differences between products and providers.Here we examine the Cisco, Microsoft, and Zoom platforms, highlight the unique features of each product, and explain how the products differ from one another.
Posted: 17 Jun 2021 | Published: 17 Jun 2021

TechTarget ComputerWeekly.com

Computer Weekly – 12 September 2023: The dangers of breaking encryption
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we detail the concerns of IT experts about the UK's Online Safety Bill's proposals to weaken end-to-end message encryption. Our buyer's guide continues to look at the issues around integrating SaaS applications, with a particular eye to the proliferation of SaaS during the Covid pandemic. Read the issue now.
Posted: 11 Sep 2023 | Published: 12 Sep 2023

TechTarget ComputerWeekly.com