System Complex Reports

The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 08 Feb 2021 | Published: 29 Jul 2016

TechTarget ComputerWeekly.com

A guide to continuous software delivery
sponsored by TechTarget ComputerWeekly.com
EBOOK: Software empowers business strategy. In this e-guide we explore how to deliver new software-powered functionality for continuous business improvement.
Posted: 30 Aug 2022 | Published: 30 Aug 2022

TechTarget ComputerWeekly.com

CW Nordics November 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The Nordic countries are pace-setters when it comes to digital transformation and although there is a wealth of IT talent in the region, it seems it is not enough.
Posted: 08 Feb 2021 | Published: 23 Nov 2017

TechTarget ComputerWeekly.com

Secure Voting
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 08 Feb 2021 | Published: 04 Apr 2016

TechTarget ComputerWeekly.com

Computer Weekly – 19 March 2024: What went wrong with Birmingham's Oracle project?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after Birmingham City Council's disastrous Oracle project cost over £100m, we analyse where it all went wrong. Our new buyer's guide examines building a sustainable IT strategy. And we find out how Thomson Reuters is using AI to enhance its product offerings. Read the issue now.
Posted: 19 Mar 2024 | Published: 19 Mar 2024

TechTarget ComputerWeekly.com

Enterprise cloud applications – can we trust them?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
Posted: 08 Feb 2021 | Published: 27 Jul 2016

TechTarget ComputerWeekly.com

Computer Weekly – 16 April 2024: VMware users hit by licence hikes after Broadcom takeover
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, VMware users are facing licence fee increases after the acquisition by Broadcom, with education bodies worst hit – we talk to unhappy customers. Read the issue now.
Posted: 12 Apr 2024 | Published: 16 Apr 2024

TechTarget ComputerWeekly.com

Software licensing – battleground or crucible?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Will software licensing continue to be a battleground for suppliers and users, or can new, mature relationships between the two sides be forged in the digital crucible of contemporary on-demand, pay as you go software?
Posted: 08 Feb 2021 | Published: 17 Aug 2017

TechTarget ComputerWeekly.com

Computer Weekly – 12 September 2023: The dangers of breaking encryption
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we detail the concerns of IT experts about the UK's Online Safety Bill's proposals to weaken end-to-end message encryption. Our buyer's guide continues to look at the issues around integrating SaaS applications, with a particular eye to the proliferation of SaaS during the Covid pandemic. Read the issue now.
Posted: 11 Sep 2023 | Published: 12 Sep 2023

TechTarget ComputerWeekly.com

The DCIM Tool and Its Place in the Modern Data Center
sponsored by RunSmart
EGUIDE: Because there is a learning curve with DCIM tools, buyers must first consider why their organizations might need them and examine their features. Download now to see the role DCIM tools play in disaster prevention preparation, asset management, monitoring and managing energy costs, and more.
Posted: 11 Dec 2017 | Published: 05 Dec 2017

RunSmart