PatriotGrid Reports

CW APAC, March 2021: Tech career guide
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at the qualities and skills that are required to be successful in DevOps.
Posted: 15 Mar 2021 | Published: 04 Mar 2021

TechTarget ComputerWeekly.com

Metropolitan Police Freedom of Information disclosure on investigations into WikiLeaks
sponsored by TechTarget ComputerWeekly.com
RESOURCE: Letter from the Met Police to Stefania Maurizi, an investigative journalist with Italy's La Repubblica newspaper, confirming that the police service shared correspondence about one or more of three named WikiLeaks British editorial staff with the US Department of Justice. The letter is a response to a freedom of information request by Maurizi.
Posted: 08 Feb 2021 | Published: 14 Mar 2019

TechTarget ComputerWeekly.com

Declaration by David Godkin producing 212 sealed exhibits - 16 May 2018
sponsored by TechTarget ComputerWeekly.com
RESOURCE: The exhibits produced in this declaration by David Godkin, counsel for app developer Six4Three, contain internal Facebook communications, including emails between CEO Mark Zuckerberg and senior executives, correspondence and chat-logs, spreadsheets and strategy presentations.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021

TechTarget ComputerWeekly.com

Guide to Flexible Working
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This guide from Vodafone explains how to introduce flexible working, what technologies to consider and how to succeed at implementation.
Posted: 08 Feb 2021 | Published: 07 Apr 2016

TechTarget ComputerWeekly.com

Global Security Report 2011
sponsored by Trustwave
WHITE PAPER: In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.
Posted: 27 Jan 2011 | Published: 26 Jan 2011

Trustwave

Expanding Active Decision-Making: The Power of Integrating Business Rules and Events
sponsored by Red Hat and JBoss
WHITE PAPER: This white paper demonstrates how using JBoss Enterprise BRMS, business analysts, developers, and integrators can create and manage rules and events in a single product using a shared set of authoring tools.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

Red Hat and JBoss

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER: Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

About to Buy Guide: Building a Business Case for DR
sponsored by TechTarget CIO
EGUIDE: Are you a CIO looking to justify your DR project to upper management? This Q&A with Paul Kirvan, a consultant with more than 20 years of experience in business continuity management, will give you a perspective on the overall issue of DR and why your organization should implement a documented backup plan.
Posted: 05 Mar 2013 | Published: 05 Mar 2013

TechTarget CIO

Computer Weekly – 16 January 2024: All eyes are on the Post Office scandal – at last
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, 15 years since we first revealed the plight of subpostmasters, and four years since their High Court victory, the UK public and government are getting behind the victims, thanks to a TV dramatisation of the scandal. We look at plans to quash convictions and analyse Fujitsu’s role in the scandal. Read the issue now.
Posted: 12 Jan 2024 | Published: 16 Jan 2024

TechTarget ComputerWeekly.com