Internet Systems Reports

CW Nordics February-April 2020: Swedes lose faith in social media as data security fears increase
sponsored by TechTarget ComputerWeekly.com
EZINE: Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result.
Posted: 08 Feb 2021 | Published: 27 Feb 2020

TechTarget ComputerWeekly.com

Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Jun 2020

TechTarget ComputerWeekly.com

Computer Weekly – 21 August 2018: Delivering the potential of the internet of things
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we hear from early adopters of internet of things technologies about how to deliver on the potential of IoT. We examine strategies for combining hyper-converged infrastructure and cloud storage to best effect. And we find out how the UK government intends to use data to improve Britain's railways. Read the issue now.
Posted: 08 Feb 2021 | Published: 17 Aug 2018

TechTarget ComputerWeekly.com

CW Middle East Jan to Mar 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: The Middle East is investing heavily in IT to make life better for its population. Smart city developments are an example. But read in this issue how in the Middle East, where there is a growing population and a rise in lifestyle-related disease, IT is being used to support the healthcare system.
Posted: 08 Feb 2021 | Published: 11 Jan 2018

TechTarget ComputerWeekly.com

A Comprehensive Guide to Enterprise IoT Project Success
sponsored by Xively by LogMeIn
EGUIDE: Whether you're just starting to learn about the Internet of Things (IoT) or you're well into your assessment of how this paradigm shift will impact your organization, this e-guide can help by providing valuable insights into the current state of IoT platforms and examples of how the IoT is affecting business processes now.
Posted: 03 Jun 2016 | Published: 03 May 2016

Xively by LogMeIn

Retail Website Performance- Consumer Reaction to a Poor Online Shopping Experience
sponsored by Akamai Technologies
WHITE PAPER: Retailers must understand that the online shopper segment is continually maturing and be mindful of how this evolution influences consumers' expectations.
Posted: 07 Mar 2008 | Published: 01 Jun 2006

Akamai Technologies

The Great Firewall of China? How to address the specific challenges of reaching China with your website
sponsored by CDNetworks
WHITE PAPER: This valuable guide explores the challenges of reaching China with your website and offers tips to help you successfully build a customer base in this emerging market. Also inside, find the answers to frequently asked questions regarding licensing.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

CDNetworks

GFI WebMonitor 2012
sponsored by GFI Software
TRIAL SOFTWARE: Having Internet in the workplace – while a necessary feature – can cause two serious challenges: employee inefficiency and security threats. Rather than revoking Internet privileges, discover how you can properly manage and monitor Internet use, preventing these two issues.
Posted: 09 Mar 2012 | Premiered: 09 Mar 2012

GFI Software

How Does Ping Really Work?
sponsored by Global Knowledge
WHITE PAPER: The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Small Business Firewall Software Vs. Hardware Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small business firewall software and hardware firewalls are the methods used to protect computers against hacker attacks and other Internet threats.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Cisco Systems, Inc.