Internet Broadcasting Reports

5 Steps to a Successful Vista Migration: How Network Assurance Minimizes Business Risk
sponsored by Lumeta Corporation
PODCAST: Join IT expert David Arbeitel and listen to the Podcast, "5 Steps to a Successful Vista Migration: How Network Assurance Minimizes Business Risk" and discover how to make the most of your Vista migration.
Posted: 27 Apr 2007 | Premiered: Apr 27, 2007, 09:00 EDT (13:00 GMT)

Lumeta Corporation

Mail Security for Microsoft Exchange Server
sponsored by Symantec Corporation
PODCAST: This Podcast explores the key features and benefits of Mail Security 5.0 including a new user interface, an enhanced content filtering rules, new user group based rules, and windows cluster support.
Posted: 19 Feb 2007 | Premiered: Feb 1, 2007

Symantec Corporation

Getting Started with Online Storage for Backup Exec
sponsored by Symantec Corporation
PODCAST: In this podcast, Symantec Product Manager Darren Niller provides a step by step overview of the process on getting started with Symantec Online Storage.
Posted: 29 Feb 2008 | Premiered: Feb 29, 2008

Symantec Corporation

2021 UKI Media Consumption Infographic: Engaging Prospect to accelerate the buy cycle
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this infographic, we take a look at the impact of the pandemic on IT purchasing in the UKI region and analyse the best marketing and sales approaches for engaging prospect to accelerate the buy cycle.
Posted: 13 Jan 2022 | Published: 13 Jan 2022

TechTarget ComputerWeekly.com

CW Europe - March-May 2020: Experts examine Dutch government's IT problems
sponsored by TechTarget ComputerWeekly.com
EZINE: Technology experts discuss the challenges and potential solutions to the Netherlands government's IT problems.
Posted: 08 Feb 2021 | Published: 12 Mar 2020

TechTarget ComputerWeekly.com

CW Middle East - July-September 2022: UAE citizens embrace new digital technologies
sponsored by TechTarget ComputerWeekly.com
EZINE: A survey shows that people in the United Arab Emirates believe next-generation technologies such as 3D printing and artificial intelligence will become widespread in the country. Also read how the UAE has improved its security posture amid mounting cyber threats.
Posted: 22 Jun 2022 | Published: 07 Jul 2022

TechTarget ComputerWeekly.com

CW Europe - September-November 2022: Why Russia could become the world's biggest market for illegal IT
sponsored by TechTarget ComputerWeekly.com
EZINE: Faced with international sanctions and the departure of many global IT suppliers from Russia, companies there are seeking alternative, and sometimes illegal, routes to access IT products. Also read how new requirements are driving scientists and engineers in Europe back to the lab to start developing 6G technology.
Posted: 01 Sep 2022 | Published: 09 Sep 2022

TechTarget ComputerWeekly.com

CW Middle East April-June 2020: Quarter of Middle East businesses have no women in IT
sponsored by TechTarget ComputerWeekly.com
EZINE: The Middle East faces fierce competition for IT professionals with the right skills, so it is so worrying that the region's women are so underrepresented in the IT community. In fact over quarter of businesses in the Middle East have no women in their IT departments, according to Computer Weekly's Salary Survey.
Posted: 08 Feb 2021 | Published: 09 Apr 2020

TechTarget ComputerWeekly.com

CW Nordics February-April 2020: Swedes lose faith in social media as data security fears increase
sponsored by TechTarget ComputerWeekly.com
EZINE: Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result.
Posted: 08 Feb 2021 | Published: 27 Feb 2020

TechTarget ComputerWeekly.com

CW Europe - September-November 2020: IT expertise in banks' boardrooms reduces risk, says European regulator
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

TechTarget ComputerWeekly.com