Document Style Semantics and Specification Language Reports

Application Modernisation: The Essential Guide
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this guide, we look at how distributed systems have evolved to support more agile software development.
Posted: 08 Feb 2021 | Published: 27 Sep 2016

TechTarget ComputerWeekly.com

CW@50: March editions of Computer Weekly
sponsored by TechTarget ComputerWeekly.com
EZINE: We search back through the Computer Weekly archives held at The National Museum of Computing to present what was happening in IT over the past five decades.
Posted: 08 Feb 2021 | Published: 15 Mar 2016

TechTarget ComputerWeekly.com

Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
Posted: 20 Dec 2021 | Published: 21 Dec 2021

TechTarget ComputerWeekly.com

Infographic: 2019 IT Priorities - Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic, we shine a light on our 2019 IT Priorities survey results. Discover what IT departments are investing in and how much budgets are increasing by. Taken from a study of 151 respondents from across Middle East.
Posted: 08 Feb 2021 | Published: 09 Jul 2019

TechTarget ComputerWeekly.com

Computer Weekly – 4 October 2016: How Microsoft aims to tackle information overload
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the firm wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer's guide looks at network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.
Posted: 08 Feb 2021 | Published: 04 Oct 2016

TechTarget ComputerWeekly.com

Computer Weekly - 7 April 2020: Adapting IT to the new normal
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
Posted: 08 Feb 2021 | Published: 07 Apr 2020

TechTarget ComputerWeekly.com

CW@50 - What was making the news in May
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of May over the past five decades.
Posted: 08 Feb 2021 | Published: 09 May 2016

TechTarget ComputerWeekly.com

Next stage of virtualisation: Containers
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The buzz and hype surrounding container technologies has reached fever pitch in recent years, prompting CIOs and IT decision makers to mull over what role, if any, they should and could play in their digital transformation plans.
Posted: 08 Feb 2021 | Published: 03 Apr 2017

TechTarget ComputerWeekly.com

Computer Weekly - 29 November 2022: How to stop data retention from killing the planet
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.
Posted: 28 Nov 2022 | Published: 29 Nov 2022

TechTarget ComputerWeekly.com

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.