Global Internet Reports

Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Jun 2020

TechTarget ComputerWeekly.com

The sped-up deployment of IoT on the back of "failure free" 5G
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Research in November 2021 from Inmarsat Enterprise found that as many as 84% of businesses gave sped up deployment of IoT, or plan to, because of Covid.  In this guide, learn how businesses implementing IoT technologies are getting ahead of the competition across their value chains.
Posted: 10 Dec 2021 | Published: 10 Dec 2021

TechTarget ComputerWeekly.com

Highly Distributed Computing Is Key to Quality on the HD Web
sponsored by Akamai Technologies
WHITE PAPER: This paper outlines the basic requirements for delivering high-definition (HD) video via broadband and describes how Akamai, through highly distributed computing, is uniquely able to extend the Internet's capacity.
Posted: 07 Mar 2008 | Published: 01 Jan 2007

Akamai Technologies

Mobile Internet 3.0: How Operators Can Become Service Innovators and Drive Profitability
sponsored by Juniper Networks, Inc.
WHITE PAPER: Mobile operators today have the distinct ability to become service innovators and drive profitability with the advent of Mobile Internet 3.0. Learn how you can expand your data revenue base in this resource.
Posted: 01 May 2012 | Published: 23 Apr 2012

Juniper Networks, Inc.

Computer Weekly – 31 May 2016: The rise of machine intelligence
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how machine intelligence is becoming increasingly commoditised – and what it means for enterprise IT. After Three's takeover of O2 was blocked, we look at the future for the UK's mobile operators. And we find out about attempts to address some of the fundamental flaws of the internet. Read the issue now.
Posted: 27 May 2016 | Published: 23 May 2016

TechTarget ComputerWeekly.com

The Human Face of Big Data: Pulse of the Planet
sponsored by TechTarget ComputerWeekly.com
BOOK: Big Data is about to radically transform our understanding of the planet, writes entrepreneur and commentator, Esther Dyson.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

TechTarget ComputerWeekly.com

A Comprehensive Guide to Enterprise IoT Project Success
sponsored by Xively by LogMeIn
EGUIDE: Whether you're just starting to learn about the Internet of Things (IoT) or you're well into your assessment of how this paradigm shift will impact your organization, this e-guide can help by providing valuable insights into the current state of IoT platforms and examples of how the IoT is affecting business processes now.
Posted: 03 Jun 2016 | Published: 03 May 2016

Xively by LogMeIn

IBM Internet Security Systems X-Force® 2008 Mid-Year Trend Statistics
sponsored by IBM
WHITE PAPER: Read this white paper to discover the implications, so you can enhance information security for the rest of 2008 and beyond.
Posted: 27 Oct 2008 | Published: 27 Oct 2008

IBM

How (and Why) to Get Going with Windows Vista Adoption
sponsored by Microsoft
TECHNICAL ARTICLE: There is a lot of misinformation about Windows Vista in a managed IT environment. This article is intended to clear up misperceptions and provide an honest and frank assessment of the challenges and benefits of Windows Vista for IT professionals.
Posted: 26 Nov 2008 | Published: 26 Nov 2008

Microsoft

The Human Face of Big Data: Data Driven
sponsored by TechTarget ComputerWeekly.com
BOOK: Software engineers are transforming the daily lives of hundreds of millions of people for good and for ill, writes Jonathan Harris.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

TechTarget ComputerWeekly.com