Web Privacy Reports

The future of storage
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.
Posted: 08 Feb 2021 | Published: 13 Oct 2020

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to compliance, risk and governance
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 08 Feb 2021 | Published: 19 Nov 2019

TechTarget ComputerWeekly.com

Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018
sponsored by TechTarget ComputerWeekly.com
RESOURCE: David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

CW Innovation Awards: NUHS taps RPA in Covid-19 swab tests
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this case study, learn how Singapore's National University Health System deployed RPA bots to automate patient registration during Covid-19 swab tests as part of broader efforts to improve efficiency.
Posted: 11 May 2021 | Published: 11 May 2021

TechTarget ComputerWeekly.com

IBM InfoSphere Guardium Data Redaction
sponsored by IBM
WHITE PAPER: InfoSphere Guardium is a key part of the IBM InfoSphere portfolio. IBM InfoSphere software is an integrated platformfor defining, integrating, protecting and managing trusted information across your systems.
Posted: 13 Apr 2011 | Published: 13 Apr 2011

IBM

Upgrading Wireless Networks in the Hospital
sponsored by TechTarget Health IT
EBOOK: In the next few years, hospitals will be rolling out all kinds of technology to improve patient care. Each of these devices and systems must be able to send and receive information instantly.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

TechTarget Health IT

Computer Weekly – 16 February 2016: How AstraZeneca saved $350m by insourcing IT
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to pharmaceutical giant AstraZeneca to find out why it brought its outsourced IT back in-house, saving $350m per year as a result. We ask if the new EU/US Privacy Shield agreement will protect citizens' data. And we examine the relative merits of datacentre colocation and the cloud. Read the issue now.
Posted: 12 Feb 2016 | Published: 12 Feb 2016

TechTarget ComputerWeekly.com

Computer Weekly – 20 August 2013: Mixing work and play – how corporate applications can learn from computer games
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at gamification, the trend for corporate software to use techniques developed for computer games. After the Prism internet surveillance scandal, Switzerland hopes to become a safe location for cloud services. And we talk to an NHS CIO about the challenges of a paperless health service. Read the issue now.
Posted: 20 Aug 2013 | Published: 20 Aug 2013

TechTarget ComputerWeekly.com

Business-driven data privacy policies - Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data.
sponsored by IBM
WHITE PAPER: This resource offers insight to help you establish and enforce business-driven data privacy policies. Read on to learn how to comply with privacy regulations, navigate data governance requirements, and more.
Posted: 27 Feb 2014 | Published: 28 Feb 2013

IBM

Data Security and Privacy Concerns Pushed into the Spotlight
sponsored by GeoTrust, Inc.
EGUIDE: In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

GeoTrust, Inc.