IM Spam Reports

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

The Automation Architect’s Handbook: Leading End-To-End Automation Journeys
sponsored by Red Hat
EBOOK: In this automation architect’s guiding e-book, discover a walkthrough map of the steps required to lead your organization beyond task-centric automation toward an enterprise-wide strategy.
Posted: 19 Apr 2024 | Published: 19 Apr 2024

Red Hat

AI in Fraud Management: Uses cases, benefits and challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE: AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.
Posted: 01 Mar 2023 | Published: 08 Mar 2023

TechTarget ComputerWeekly.com

Video: IT Priorities 2023 APAC
sponsored by TechTarget ComputerWeekly.com
VIDEO: Over half of respondents in this year's IT Priorities study have bigger IT budgets as they continue to make strategic investments in cyber security, cloud and automation. In this video, hear from TechTarget's APAC editor in chief on the top priorities of organisations and the major tech trends that are shaping IT buying decisions in the region.
Posted: 30 Mar 2023 | Premiered: 30 Mar 2023

TechTarget ComputerWeekly.com

2023 IT Priorities APAC Report
sponsored by TechTarget ComputerWeekly.com
EGUIDE: IT leaders across APAC remain bullish about IT spending despite macroeconomic headwinds as they continue to invest in strategic areas such as cyber security, automation and cloud computing to bolster their digital chops.In this e-guide, read more about the findings revealed by the latest TechTarget/Computer Weekly IT Priorities 2023 study.
Posted: 14 Apr 2023 | Published: 14 Apr 2023

TechTarget ComputerWeekly.com

Comprehensive Single-Vendor SASE Introductory E-book
sponsored by Fortinet, Inc.
EBOOK: This easy-to-read, easy-to-understand ebook consists of six engaging and enlightening sections. Each chapter is written as a standalone piece to help you better understand SASE solutions. Download it here to start reading at your leisure.
Posted: 27 Oct 2023 | Published: 22 Sep 2023

TOPICS:  Security
Fortinet, Inc.

Unlock Endless Possibilities with Easy to Use AI Tools
sponsored by Slack
WHITE PAPER: Enable smarter and more secure collaboration with simple access to AI-powered time-savers.
Posted: 20 Dec 2023 | Published: 20 Dec 2023

TOPICS:  IT Management
Slack

16 Tips for Working Smarter with Slack Apps and Workflows
sponsored by Slack
WHITE PAPER: Learn how to harness Slack's integrations and advanced features automate workflows and optimise communication.
Posted: 20 Dec 2023 | Published: 20 Dec 2023

TOPICS:  IT Management
Slack

World-Record Performance for AI and ML
sponsored by Dell Technologies & AMD
WHITE PAPER: In this eGuide, you will hear that organizations depend on artificial AI and ML to forecast sales, segment their customer bases and identify risks. Download this guide and learn three Dell PowerEdge servers that have set world records in a benchmark specifically designed to provide real-world performance data on AI and ML workloads.
Posted: 16 May 2023 | Published: 16 May 2023

TOPICS:  IT Management
Dell Technologies & AMD

A Computer Weekly buyer's guide to secure coding
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security has become a key consideration in coding. In this 15-page buyer's guide, Computer Weekly looks at how organisations can protect their software supply chains, what to do in the case of a code error and why securing application development is so vital.
Posted: 07 Jul 2023 | Published: 07 Jul 2023

TechTarget ComputerWeekly.com