Internet Information Server Reports

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TechTarget ComputerWeekly.com

CW500: A roadmap to software-defined everything – Paddy Power Betfair
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything - this presentation was given by Steven Armstrong, principal automation engineer at Paddy Power Betfair.
Posted: 08 Feb 2021 | Published: 17 Oct 2016

TechTarget ComputerWeekly.com

Next stage of virtualisation: Containers
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The buzz and hype surrounding container technologies has reached fever pitch in recent years, prompting CIOs and IT decision makers to mull over what role, if any, they should and could play in their digital transformation plans.
Posted: 08 Feb 2021 | Published: 03 Apr 2017

TechTarget ComputerWeekly.com

Secure Voting
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 08 Feb 2021 | Published: 04 Apr 2016

TechTarget ComputerWeekly.com

CW@50: March editions of Computer Weekly
sponsored by TechTarget ComputerWeekly.com
EZINE: We search back through the Computer Weekly archives held at The National Museum of Computing to present what was happening in IT over the past five decades.
Posted: 08 Feb 2021 | Published: 15 Mar 2016

TechTarget ComputerWeekly.com

Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
Posted: 20 Dec 2021 | Published: 21 Dec 2021

TechTarget ComputerWeekly.com

Building and Implementing a True SDDC Platform
sponsored by TechTarget Data Center
EBOOK: Choosing a software-defined data center platform requires planning and a thorough technology evaluation. In this handbook, find out what it takes to build and implement a software-defined data center platform that works.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

TechTarget Data Center

API Management: The role of APis in digital business transformation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

CW EMEA - January 2023: Protecting the privacy of schoolchildren
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.
Posted: 11 Jan 2023 | Published: 12 Jan 2023

TechTarget ComputerWeekly.com

The DCIM Tool and Its Place in the Modern Data Center
sponsored by RunSmart
EGUIDE: Because there is a learning curve with DCIM tools, buyers must first consider why their organizations might need them and examine their features. Download now to see the role DCIM tools play in disaster prevention preparation, asset management, monitoring and managing energy costs, and more.
Posted: 11 Dec 2017 | Published: 05 Dec 2017

RunSmart