e-Voting Reports

Government to bail out Post Office
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: The Post Office does not have enough money to pay compensation to the subpostmasters it wrongfully prosecuted. The government is stepping in to use more taxpayers' money to compensate subpostmasters who were ruined by the Post Office Horizon scandal.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

TechTarget ComputerWeekly.com

Computer Weekly – 31 July 2018: Learning digital government lessons from Estonia
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at one of the world's most digitally advanced nations, Estonia, and ask what the UK government can learn. We talk to Airbus about how aircraft manufacturers are prioritising cyber security. And we examine how AI and robots will augment – not replace – human productivity. Read the issue now.
Posted: 08 Feb 2021 | Published: 27 Jul 2018

TechTarget ComputerWeekly.com

E-government benchmark 2016
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: The results of the latest e-government benchmark show a cautious acceleration of e-government implementation in Europe.
Posted: 08 Feb 2021 | Published: 03 Feb 2017

TechTarget ComputerWeekly.com

Protecting Critical Data is a Main Priority for the U.S. Army
sponsored by Globalscape
CASE STUDY: In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
Posted: 22 May 2014 | Published: 31 Dec 2013

Globalscape

Computer Weekly – 1 July 2014: Supporting Apple in the enterprise
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide takes an in-depth look at how to support Apple products in an enterprise IT infrastructure. We find out how eBay built its own Openstack private cloud. And the chief of the government's G-Cloud programme talks about changing public sector IT procurement. Read the issue now.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

TechTarget ComputerWeekly.com

Computer Weekly – 31 March 2015: What went wrong with the IT for farmers' rural payments?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the real reasons behind the failure of the government's rural payments digital service. We look at how Windows 10 Universal Apps will change the way IT teams manage PCs. And we hear from IT leaders about their experiences of bringing cloud computing into the mainstream. Read the issue now.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

TechTarget ComputerWeekly.com

Government to bail out Post Office
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: The Post Office does not have enough money to pay compensation to the subpostmasters it wrongfully prosecuted. The government is stepping in to use more taxpayers' money to compensate subpostmasters who were ruined by the Post Office Horizon scandal.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

IT Priorities 2020: European IT budget share reflects home-working challenges brought by Covid
sponsored by TechTarget ComputerWeekly.com
EGUIDE: European organisations are being forced to redivert more limited budgets during the pandemic. This Eguide dives into the reasons as to how and why this shift is occurring in IT companies across the continent.
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

Leverage Security Intelligence for Government Agencies
sponsored by IBM
WHITE PAPER: This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
Posted: 05 Mar 2014 | Published: 31 Mar 2013

IBM