e-Voting Reports

IT Priorities 2020: European IT budget share reflects home-working challenges brought by Covid
sponsored by TechTarget ComputerWeekly.com
EGUIDE: European organisations are being forced to redivert more limited budgets during the pandemic. This Eguide dives into the reasons as to how and why this shift is occurring in IT companies across the continent.
Posted: 08 Feb 2021 | Published: 16 Nov 2020

TechTarget ComputerWeekly.com

Digital Transformation: Part I
sponsored by TechTarget ComputerWeekly.com
PRESENTATION: In this presentation from our CW500 event, director of digital architecture and transformation Chris Boyd explains how Telefonica tackled the challenges of delivering people, cultural and organisational change.
Posted: 08 Feb 2021 | Published: 17 Mar 2016

TechTarget ComputerWeekly.com

Billion Dollar Blindness
sponsored by TechTarget
WEBCAST: Access this webcast to learn how using the latest intent data and AI-driven technologies can transform their productivity and yields from a market, an ICP, or a set of named ABM accounts.
Posted: 08 Feb 2021 | Premiered: Feb 19, 2020

TechTarget

Top 10 Middle East stories of 2018
sponsored by TechTarget ComputerWeekly.com
EGUIDE: With money to invest and well-educated populations, the region is using advanced technology to enhance business as well as the quality of life. Read this top 10 for more examples of digital transformation in the Middle East.
Posted: 08 Feb 2021 | Published: 09 Jan 2019

TechTarget ComputerWeekly.com

Essential Guide: Using green computing for improving energy efficiency
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: A guide to choosing green computing for your IT department. Learn how and why you should consider improving energy efficiency techniques within your business.
Posted: 08 Feb 2021 | Published: 13 Mar 2018

TechTarget ComputerWeekly.com

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift

Computer Weekly – 21 January 2014: The IT risks facing Universal Credit
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the ongoing IT risks facing the UK government's highest-profile IT project – the troubled Universal Credit programme. We talk to IT leaders to find out their spending priorities for 2014. And we find out about the latest best practice in improving datacenter performance. Read the issue now.
Posted: 20 Jan 2014 | Published: 21 Jan 2014

TechTarget ComputerWeekly.com

Computer Weekly – 7 October 2014: The future of digital government in the UK
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the future of digital government in the UK, featuring interviews with Whitehall's digital chief Mike Bracken and Labour's policy leader Chi Onwurah. Also, we look at the growth of OpenStack, and find out what it's like to be on the receiving end of a data breach. Read the issue now.
Posted: 06 Oct 2014 | Published: 07 Oct 2014

TechTarget ComputerWeekly.com

Computer Weekly – 24 February 2015: Banks take the fight to the web giants
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with internet giants like Google, Apple and Facebook offering banking services, Santander is leading the fightback by launching a cloud storage service; but can it win? Our latest buyer's guide looks at cloud-optimised IT. And we examine how the economic trends will affect CIOs this year. Read the issue now.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

TechTarget ComputerWeekly.com

Leverage Security Intelligence for Government Agencies
sponsored by IBM
WHITE PAPER: This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
Posted: 05 Mar 2014 | Published: 31 Mar 2013

IBM