Enterprise Data Management Reports

Data classification tools: What they do and who makes them
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Data classification is an essential pre-requisite to data protection, security and compliance. Firms need to know where their data is and the types of data they hold. In this article, learn more about how these tools can help keep your data tidy and which suppliers offer the best options in the market.
Posted: 15 May 2023 | Published: 15 May 2023

TechTarget ComputerWeekly.com

Top IT Predictions in APAC in 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this round-up, we review some of the key IT trends that are likely to shape the industry across the APAC region in 2023.
Posted: 19 Dec 2022 | Published: 20 Dec 2022

TechTarget ComputerWeekly.com

2020 Media Consumption Series Infographic Pack
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Here they are, the final results of our 2020 Media Consumption Series all packaged together. We take a dive in to the who, what, why, where, when, and how the IT sector consumes all forms of digital media and more. Answering questions such as why sales reps with data driven intent get the best response rates and what subject lines get the open?
Posted: 08 Feb 2021 | Published: 15 Dec 2020

TechTarget ComputerWeekly.com

Computer Weekly – 26 March 2024: What are IT buyers spending their money on?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal the technologies that IT buyers are spending their money on this year. The European CIO at PepsiCo explains how to make digital transformation go with a pop. And we look at the growing importance of cloud-to-cloud backup for data protection and resilience. Read the issue now.
Posted: 25 Mar 2024 | Published: 26 Mar 2024

TechTarget ComputerWeekly.com

Infographic: 10-step guide for testing backups
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Creating and adopting a data backup plan is only the first step to protect enterprises against the possibility of a system failure. To achieve complete data protection, it is also necessary to establish a backup testing strategy. Here are ten recommendations to ensure that your organization's data will always be safe, secure and rapidly available.
Posted: 29 Nov 2021 | Published: 29 Nov 2021

TechTarget ComputerWeekly.com

CW APAC, April 2021: Trend Watch: IoT in India
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on the internet of things in India, Computer Weekly looks at the country's potential as an IoT hotspot.
Posted: 26 Apr 2021 | Published: 26 Apr 2021

TechTarget ComputerWeekly.com

Computer Weekly – 24 October 2023: Brewing data insights at Heineken
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how brewing giant Heineken is building a data ecosystem to share insights and tap into AI capabilities. The UK is conducting an investigation into cloud supplier dominance – what will it mean for users? And we examine how generative AI could be used to improve customer experience. Read the issue now.
Posted: 24 Oct 2023 | Published: 24 Oct 2023

TechTarget ComputerWeekly.com

CW APAC, December 2021: Expert guide to cloud migration
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at the key considerations and strategies that enterprises can take when moving their workloads to public cloud
Posted: 09 Dec 2021 | Published: 09 Dec 2021

TechTarget ComputerWeekly.com

CW APAC May 2023 – Expert advice on security and threat intelligence
sponsored by TechTarget ComputerWeekly.com
EZINE: Computer Weekly looks at the software supply chain, Mimecast's email security, Australian data breaches and Singapore's threat intelligence.
Posted: 18 May 2023 | Published: 18 May 2023

TechTarget ComputerWeekly.com

UK police unlawfully processing over a million people's data on Microsoft 365
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

TechTarget ComputerWeekly.com