Basel Capital Accord Reports

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos

Computer Weekly – 17 October 2017: Microsoft CEO Satya Nadella on empathy and innovation
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this week's Computer Weekly, Microsoft CEO Satya Nadella explains why he has made empathy a key part of technology innovation. We examine the latest news in the ongoing debate over the tax status of IT contractors in the public sector. And we ask if an emphasis on creativity will help attract more young people to work in IT. Read the issue now.
Posted: 08 Feb 2021 | Published: 13 Oct 2017

TechTarget ComputerWeekly.com

Where next for Blockchain?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read about how the technology's inherent security makes it tamper-proof, and perfect for keeping and sharing records for transactions in many scenarios. Also, discover why think-tank 'Reform' believes that the government should use blockchain technology for identity assurance services across the public sector.
Posted: 08 Feb 2021 | Published: 12 Dec 2017

TechTarget ComputerWeekly.com

Digital Transformation: Part 2
sponsored by TechTarget ComputerWeekly.com
PRESENTATION: In this presentation from our CW500 event, digital transformation programme director Richard Philips explains how the AA tackled the challenges of delivering people, cultural and organisational change.
Posted: 08 Feb 2021 | Published: 16 Mar 2016

TechTarget ComputerWeekly.com

CIO and leadership survey 2017
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This survey of 80 CIOs and IT leaders by Coeus Consulting shows the technology and financial trends facing IT leaders and businesses.
Posted: 08 Feb 2021 | Published: 27 Jan 2017

TechTarget ComputerWeekly.com

Global Connectivity Index 2016
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: The Global Connectivity Index (GCI) 2016 from Huawei measures the progress of 50 nations in investing in and deploying Information and Communications Technology (ICT) to achieve economic digitisation
Posted: 08 Feb 2021 | Published: 28 Sep 2016

TechTarget ComputerWeekly.com

Power Your Pipeline with Purchase Intent
sponsored by TechTarget
EBOOK: With this 3-part ebook, discover how purchase intent data can help your organization gain a competitive advantage in your specific markets. Learn how to evaluate practical applications of B2B purchase intent data for marketing, sales, and ABM. And explore how intent data can help your organization capture more demand, accelerate sales, and more.
Posted: 08 Feb 2021 | Published: 22 Aug 2019

TechTarget

A Computer Weekly buyer's guide to financial analytics for planning
sponsored by TechTarget ComputerWeekly.com
EBOOK: The current economic climate provides a strong reason for firms to turn to the advantages of software. In this 14-page buyer's guide, Computer Weekly looks at the role of datasets in accounting, how technology is helping finance departments control budgets and the importance of integrating automation into business processes.
Posted: 22 Nov 2022 | Published: 22 Nov 2022

TechTarget ComputerWeekly.com

Financial applications automation – promise is real but needs business nous
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The automation of the financial software that lies at the heart of any business – accountancy, budget management, general ledger, payroll, and so on – is a prize many organisations are eyeing up, with machine learning and robotic process automation close to mind. Find out everything you need to know by downloading this PDF E-Guide.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

TechTarget ComputerWeekly.com

CW Europe – October 2014 Edition
sponsored by TechTarget ComputerWeekly.com
EZINE: BYOD policies: What's allowed and what's banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

TechTarget ComputerWeekly.com