Remote Method Invocation Reports

CW Benelux November 2020-January 2021: Dutch Alzheimer's app helps dementia patients
sponsored by TechTarget ComputerWeekly.com
EZINE: An app aimed at helping dementia patients and their families has been developed by the Alzheimer Society in the Netherlands and has been welcomed with enthusiasm.
Posted: 08 Feb 2021 | Published: 12 Nov 2020

TechTarget ComputerWeekly.com

The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 08 Feb 2021 | Published: 29 Jul 2016

TechTarget ComputerWeekly.com

Does a proprietary solution automatically mean vendor lock-in?
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: The dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?
Posted: 08 Feb 2021 | Published: 14 Mar 2016

TechTarget ComputerWeekly.com

Computer Weekly – 19 March 2024: What went wrong with Birmingham's Oracle project?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after Birmingham City Council's disastrous Oracle project cost over £100m, we analyse where it all went wrong. Our new buyer's guide examines building a sustainable IT strategy. And we find out how Thomson Reuters is using AI to enhance its product offerings. Read the issue now.
Posted: 19 Mar 2024 | Published: 19 Mar 2024

TechTarget ComputerWeekly.com

Gamma International: The Macedonia files
sponsored by TechTarget ComputerWeekly.com
RESOURCE: This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 08 Feb 2021 | Published: 23 Nov 2017

TechTarget ComputerWeekly.com

Computer Weekly – 13 August 2019: How tech experts could earn millions as whistleblowers
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, a tech expert is set to earn millions after successfully blowing the whistle on vulnerabilities in Cisco's video surveillance software. Our latest buyer's guide examines the issues around big data architecture. And we look at how the end of Windows 7 could spark a new era for desktop productivity. Read the issue now.
Posted: 08 Feb 2021 | Published: 13 Aug 2019

TechTarget ComputerWeekly.com

Computer Weekly - 15 March 2022: How the tech sector is supporting Ukraine
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.
Posted: 14 Mar 2022 | Published: 15 Mar 2022

TechTarget ComputerWeekly.com

The Ultimate Guide to Enterprise Content Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Enterprise Content Management (ECM) has rapidly evolved as different forms of content have been introduced to the work environment. In this guide, find out how ECM works, why it is so important, the key components and benefits, and what to look for when choosing ECM software.
Posted: 05 Oct 2022 | Published: 05 Oct 2022

TechTarget ComputerWeekly.com

Secure DevOps Brings Better, Faster, Safer Software
sponsored by TechTarget Security
EBOOK: In the rush to implement DevOps, security is too often overlooked. But DevSecOps is essential in these hack-filled days. Learn how you can add security to software development today.
Posted: 03 May 2019 | Published: 03 May 2019

TechTarget Security

Analyst Report - Vendor Comparison for Integrated Quality Suite
sponsored by IBM
ANALYST REPORT: According to Gartner, vendors must demonstrate both "completeness of vision" and an "ability to execute" to be evaluated as a leader. Gartner's 2011 Magic Quadrant for Integrated Software Quality Suites evaluates IBM as a leader. Read the report to learn more.
Posted: 08 Feb 2021 | Published: 02 Sep 2011

IBM