Personal Budgeting Software Reports

Computer Weekly – 26 February 2019: Delving into viewer data at the BBC
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the BBC about how the UK broadcaster is using data analytics to better understand its viewers and grow its audience. We look at how CERN is using IT automation in its quest to unravel the mysteries of the universe. And we examine the impact of GDPR on cloud storage. Read the issue now.
Posted: 08 Feb 2021 | Published: 22 Feb 2019

TechTarget ComputerWeekly.com

Gamma International: The Macedonia files
sponsored by TechTarget ComputerWeekly.com
RESOURCE: This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 08 Feb 2021 | Published: 23 Nov 2017

TechTarget ComputerWeekly.com

Infographic: 2019 IT Priorities - Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic, we shine a light on our 2019 IT Priorities survey results. Discover what IT departments are investing in and how much budgets are increasing by. Taken from a study of 151 respondents from across Middle East.
Posted: 08 Feb 2021 | Published: 09 Jul 2019

TechTarget ComputerWeekly.com

Computer Weekly – 18 June 2019: Applying AI to road safety
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit a Tokyo project where artificial intelligence is helping to improve road safety by detecting potential subsidence. As bug bounty programmes become popular, we look at what's involved and the pitfalls to beware. And we discuss digital development in healthcare with NHS England. Read the issue now.
Posted: 08 Feb 2021 | Published: 18 Jun 2019

TechTarget ComputerWeekly.com

AI & Automation: Turning data into insights
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the trends that are shaping the demand for AI and how organizations including healthcare service providers and F1 racing teams are leveraging technology on their own terms.
Posted: 08 Feb 2021 | Published: 11 Jul 2018

TechTarget ComputerWeekly.com

Computer Weekly – 4 October 2016: How Microsoft aims to tackle information overload
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the firm wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer's guide looks at network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.
Posted: 08 Feb 2021 | Published: 04 Oct 2016

TechTarget ComputerWeekly.com

Application Modernisation: The Essential Guide
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this guide, we look at how distributed systems have evolved to support more agile software development.
Posted: 08 Feb 2021 | Published: 27 Sep 2016

TechTarget ComputerWeekly.com

Computer Weekly - 19 November 2019: Is facial recognition happening too fast?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.
Posted: 08 Feb 2021 | Published: 19 Nov 2019

TechTarget ComputerWeekly.com

CW Nordics November 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The Nordic countries are pace-setters when it comes to digital transformation and although there is a wealth of IT talent in the region, it seems it is not enough.
Posted: 08 Feb 2021 | Published: 23 Nov 2017

TechTarget ComputerWeekly.com

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.