Software Piracy Reports

7 Key Factors to Software Protection
sponsored by Arxan
WHITE PAPER: This white paper explores the magnitude and types of software piracy threats and details the seven key application security factors that must be considered during the development process.
Posted: 08 Jun 2007 | Published: 01 Jun 2007

Arxan

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021

TechTarget ComputerWeekly.com

Digital Transformation: Part I
sponsored by TechTarget ComputerWeekly.com
PRESENTATION: In this presentation from our CW500 event, director of digital architecture and transformation Chris Boyd explains how Telefonica tackled the challenges of delivering people, cultural and organisational change.
Posted: 08 Feb 2021 | Published: 17 Mar 2016

TechTarget ComputerWeekly.com

Computer Weekly – 7 June 2022: Using technology to reinvent shopping
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after the pandemic led to a boom in e-commerce, we look at how retailers are turning to tech to revitalise their stores. We examine the issues around using algorithmic automation to manage employees. And we find out how data science is supporting drug discovery at Novartis. Read the issue now.
Posted: 01 Jun 2022 | Published: 07 Jun 2022

TechTarget ComputerWeekly.com

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER: Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

About to Buy Guide: Building a Business Case for DR
sponsored by TechTarget CIO
EGUIDE: Are you a CIO looking to justify your DR project to upper management? This Q&A with Paul Kirvan, a consultant with more than 20 years of experience in business continuity management, will give you a perspective on the overall issue of DR and why your organization should implement a documented backup plan.
Posted: 05 Mar 2013 | Published: 05 Mar 2013

TechTarget CIO

Achieving Value in Healthcare Through Efficiency and Effectiveness
sponsored by DellEMC and Intel®
WHITE PAPER: this white paper demonstrates how, by reforming health care delivery, implementing appropriate technology, and reshaping the medical establishment which supports efficiency and effectiveness, America can provide the best value in health care services for its citizens.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

DellEMC and Intel®

Take Back the Endpoint
sponsored by Kaspersky
WHITE PAPER: During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Kaspersky

E-Discovery Cross-Border Data Compliance
sponsored by Exterro
WHITE PAPER: This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro

 The Social Business - Advent of a new age
sponsored by IBM
WHITE PAPER: This white paper discusses the ins and outs of social businesses, uncovering what it means, the value it brings, and what you should expect for the future.
Posted: 23 Jun 2011 | Published: 22 Jun 2011

IBM