Cable Modem Termination System Reports

Using Bandwidth More Efficiently with Switched Digital Video
sponsored by Motorola Solutions
WHITE PAPER: Switched Digital Video (SDV) offers tremendous promise for network operators seeking to more efficiently use bandwidth and deliver highly targeted content to subscribers.
Posted: 05 Jan 2009 | Published: 31 Dec 2008

Motorola Solutions

Future-proof your profits: After-sales service as a revenue stream
sponsored by TeamViewer
EBOOK: After-sales support is no longer an afterthought—and what’s more, it can be up to 5 times more profitable than selling the machine itself. Read this e-book to maximize your after-sales profits and support, with easy-to-comprehend guidance to assist you along the way.
Posted: 08 Apr 2024 | Published: 08 Apr 2024

TeamViewer

Secure remote access: More vital than ever thanks to Covid-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to video conferencing and collaboration
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this 17-page buyer's guide, Computer Weekly looks at how employers can support a future of flexible working, with video conferencing, collaboration, augmented reality and unified comms technologies all lined up to play a part.
Posted: 15 Mar 2021 | Published: 01 Mar 2021

TechTarget ComputerWeekly.com

CW@50 - What was making the news in May
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of May over the past five decades.
Posted: 08 Feb 2021 | Published: 09 May 2016

TechTarget ComputerWeekly.com

Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

TechTarget ComputerWeekly.com

Secure remote access: More vital than ever thanks to Covid-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TechTarget ComputerWeekly.com

The Managed Services Trend Reaches the Software-Defined WAN
sponsored by TechTarget Networking
EBOOK: Learn how a managed SD-WAN can help your organization optimize network performance, increase network agility and pinpoint disabled network connections.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

TechTarget Networking

The changing role of hardware used in networks in this virtual era
sponsored by TechTarget Networking
EBOOK: It's far too soon to report the death of network hardware. In a software-defined world, a networking hardware evolution is taking place.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

TechTarget Networking

Computer Weekly – 8 November 2022: How the US-China chip war will affect IT leaders
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the US ramps up semiconductor sanctions on China, we examine the ramifications across the tech sector. Cyber criminals are turning to new forms of encryption – we talk to the Dutch researchers trying to catch them. And we look at what cloud providers need to do to improve customer experience. Read the issue now.
Posted: 04 Nov 2022 | Published: 08 Nov 2022

TechTarget ComputerWeekly.com