You've requested...

Download this next:

Computer Weekly – 4 September 2018: Power Play – how GE builds digital into its products

In this week’s Computer Weekly, we speak to Bill Ruh, the head of GE Digital about how the business has changed to focus on customer outcomes following a change in senior leadership. The company is exploring new industries to take its Predix platform such the hospitality sector.  We look at the problems implementing SAP S/4 Hana and speak to experts about how maximise success. We also explore the challenges of networking microservices. Our CIO interview is PayPoint CIO Jon Marchant.

These are also closely related to: "Moving on Up"

  • 7 Security Questions, 7 Answers From a CISO

    From a CISO’s perspective, what are the biggest security threats of the moment? This is one of the seven questions that Evolving Solutions’ CISO, Mike Burgard, tackles in this Q&A.

    Read on to unlock his answer and to discover:

    • Top priorities to keep in mind when speaking with clients about security
    • How Burgard’s experiences as both a vendor and client factor into his role
    • And more

  • Computer Weekly – 2 August 2022: How to create a datacentre capacity plan

    In this week’s Computer Weekly, planning datacentre capacity is a growing challenge – we ask the experts for the latest best practice. Victims of the Post Office IT scandal explain why they think they were targeted for speaking out. And we look at the digital skills gap in retail and find out how employers can source talent. Read the issue now.

Find more content like what you just read:

  • Breaking Down the Log4j2 Attack

    In this webcast, Endace’s Michael Morris speaks with Cisco’s Value Chain Security Leader about the Log4j2 attack. Watch now to unlock a discussion about open-source software vulnerabilities, remediation strategies and more.

    Download

  • CW ASEAN November 2016

    Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.

    Download

  • CIO Trends #7

    Read some of our most popular articles on issues faced by IT decision makers, such as how to get the most out of the internet of things, and how to tailor your IT operating model to fit in the digital age.

    Download

  • Computer Weekly – 25 April 2023: Aston Martin Formula One: Driven by data

    In this week's Computer Weekly, we speak to Aston Martin Formula One's Clare Lansley to find out how digital transformation helps the team to move further up the F1 grid. We explore how automation and AI is helping businesses tackle rising costs and also look into the maturity of Industry 4.0 initiatives. Read the issue now.

    Download

  • Media Consumption Study 2017 UKI

    The results of TechTarget and Computer Weekly's annual reader survey, which asks for feedback on readers' media consumption when considering an IT purchase, reveals the complexity of IT purchase decisions.

    Download

  • Media Consumption Study 2017 UKI Infographic

    The results of TechTarget and Computer Weekly's annual reader survey, which asks for feedback on readers' media consumption when considering an IT purchase, reveals the complexity of IT purchase decisions.

    Download

  • MicroScope – June 2022: A return to face-to-face meetings

    With the world emerging from the pandemic, what role does the personal event and face-to-face meetings hold in business? Also read about the next step for the future of collaboration and communication services, and why there needs to be greater diversity across the channel

    Download

  • Key tips for coaching your webinar speakers

    Nobody likes a dull webinar. Regardless of how exceptional your content is, if your presenter is boring or lacks confidence when conveying his or her message, your audience will eventually tune out. There goes your ROI! So, what should marketers do in advance of a speaking engagement? Tune in to this webinar to learn more.

    Download

  • MicroScope – January 2021: Looking forward to the future

    In this issue of MicroScope, take a look at what the year ahead holds for the channel after a largely positive 2020. Also discover why IAM technology is so important for post-pandemic cloud computing, and what approaches are fundamental to finding business success

    Download

  • Cloud & DevOps: a guide to becoming a software-centric organisation

    Businesses are investing time and effort in building digitally-enabled services.  In this e-guide we look at how businesses can transform their software development teams to deliver software efficiently and reliably.

    Download

  • Creating effective webinars: Marketing leader’s guide

    Every marketer must create a B2B content mix that drives authentic connections with their core buyers. But, doing this is easier said than done. How can you understand your audience’s priorities and speak to their needs with content that stands apart from the rest? Watch this webinar to learn more.

    Download

  • Fail to prepare quality data, prepare to fail

    Fail to prepare, prepare to fail is an adage that never fails to lose its veracity. The same is true of using poor quality data, known to be the bane of the lives of data analysts, not to speak of organisations that yearn to be "data driven".

    Download

  • How to elevate your content with compelling storytelling

    To create compelling content, marketers must tell their brand stories effectively and creatively. The best B2B storytellers employ narrative and graphic techniques that emotionally appeal to buyers and inspire long-lasting waves of engagement. Watch this webinar to learn more.

    Download

  • Sale’s leader’s guide to lead development

    Revenue development was conceived as a way to leverage one-to-many capabilities into more productive opportunity discovery. To learn from a leader who’s broken through, join TechTarget CMO John Steinert as he speaks with Michael Brown, head of Reltio’s Global Revenue Development organization.

    Download

  • Cloud & Outsourcing - Why Partnering Strategies Matter

    Explore how outsourcing motivations have changed and why you should adapt your sourcing strategies to keep up.

    Download

  • 5th edition of the latest trends and insights for CIOs, CTOs and CDOs.

    Thie e-guide offers a collection of some of our most popular articles on issues faced by IT decision makers, such as how to get cloud implementations right and how and why men in the technology industry have helped women progress.

    Download

  • CIO Trends #6

    Read some of our most popular articles on issues faced by IT decision makers, such as how to get DevOps right in order to deliver digital transformation. We explore digital twins and how they could be used to optimise real-world industrial assets and whether Brexit uncertainty is still dominating digital leadership conversations across the UK.

    Download

  • Computer Weekly - 16 March 2021: Containers play a key role in post-pandemic IT architectures

    In this week's Computer Weekly, our latest buyer's guide examines the key role that container technology will play in post-pandemic IT architectures. The UK government is under fire for its opaque approach to gigabit broadband strategy. And we assess the storage options for the growing volumes of unstructured data. Read the issue now.

    Download

  • CIO Trends #3

    This guide offers a collection of our most popular articles for IT leaders during the last part of 2016, looking at what it takes to be a great CIO and how to get the most out of your IT budget.

    Download

  • Focus: Enterprise digital transformation

    In this e-guide we look at how businesses can stay on track through collaboration, innovation, listening to user needs and partnering with suppliers.

    Download

  • Is the Netherlands keeping up with modern pace of digital change?

    In this quarter's CW Benelux ezine, we ask whether the Netherlands is suffering from digital delusion and if it is losing ground in the digital world.

    Download

  • Event recap: VMworld 2018 Europe

    It is the 20th anniversary year for VMware and at the VMware European conference in Barcelona, the company famous for its hypervisor, showcased how it had changed the face of IT, and where it was heading next.

    Download

  • Real-time analytics extends the reach of its business value more and more

    Organisations increasingly value data that is as current as possible. And there are other sectors where real-time data analytics and data visualisation are proving valuable. In this e-guide, we discuss how continuous real-time analytics, operating at sub-second speed, are finding real-world applicability across several industry sectors.

    Download

  • CW Europe – December 2017

    In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.

    Download

  • Enterprise Labeling a Supply Chain Strategic Imperative

    Access this in-depth white paper to discover how to implement integrated, data-driven labeling in your supply chain management strategy.

    Download

  • Cloud networking and CDN: How to get the best for your business

    In this e-guide we will be looking at how to bring innovative new software-defined tools to bear on multicloud environments, uncover some of the potential pitfalls of cloud networks and (hopefully) how to avoid them, and take a swing through the related world of content delivery networks (CDNs).

    Download

  • Expert Checklist: 11 Steps for Aligning Your BC/DR Program with Business Needs

    This e-guide provides an expert checklist for developing a successful business continuity program, designed with the specific needs of your organization in mind.

    Download

  • Infographic: 6 emerging trends in security

    In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.

    Download

  • Dutch organisations demand more from government

    In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.

    Download

  • European Perceptions, Preparedness and Strategies for IoT Security

    Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.

    Download

  • Solution Spotlight: Enforcing Mobile Security Through Secure Endpoint, Access and Applications

    Implementing a sound mobile security system starts with understanding what tools are out there and how they can be used effectively. This white paper will help you understand the security controls available to protect your workers and organization. Read on to get started.

    Download

  • Creating a Network Endpoint Security Policy for Hostile Endpoints

    Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.

    Download

  • How Threat Intelligence Can Give Enterprise Security the Upper Hand

    Attackers and threats on security are advancing at an alarming rate and many enterprises are not able to keep up. Take a look at this guide to learn more about threat intelligence and how it can be incorporating into your current security program.

    Download

  • SIEM IT Decision Center- Checklist #2

    This white paper presents SIEM use cases and technical information for security and compliance pros to better understand the threat landscape and help move their RFP process forward.

    Download

  • CW ANZ: Fix the weak links

    In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.

    Download

  • What to think about when utilizing endpoint securities

    There’s a lot to consider when establishing a proper endpoint security plan for your organization. And with so many tools available today, it is easy to forget the very basics of security. View this e-guide to help you refocus on the priorities and discover how to choose, keep or upgrade your endpoint security systems.

    Download

  • Enforcing Endpoint Security: Creating a Network Security Policy

    As more and more users utilize non-company-owned devices to gain access to corporate data, organizations must take new steps to prevent the risks and damages of hostile, malware-infested and non-compliant endpoints. Access this e-guide to explore how to create a network endpoint security policy as well as best practices for enforcing them.

    Download

  • Endpoint Security IT Decision Center Handbook 1

    Access this expert handbook to explore why organizations need strong endpoint security today more than ever, and discover how software can balance blocking malicious network threats while also granting users access to sensitive data.

    Download

  • Defining and Enforcing a Clear Mobile Device Security Policy

    If you have not set up your mobile device security plan, this E-Guide from searchSecurity.com can help. Read on to discover the importance of a new mobile security strategy, what to consider, how to address BYOD, and more.

    Download

  • Effective Ways to Search Log Files

    Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.

    Download

  • CW APAC, October 2021: Tech Career Guide

    In this handbook, Computer Weekly looks what is being done to close cyber security’s gender gap in the Asia-Pacific region

    Download

  • The various ways to fight new and emerging cybercrime

    Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.

    Download

  • Public Cloud Security Tips and Best Practices

    This expert E-Guide counts down 10 ways that that you can keep your applications safe in the public cloud. Also inside, uncover essential best practices for protecting your data and applications – read on to learn more.

    Download

  • EssentialEnterprise Mobile Device Security Controls and Policies

    In this expert guide from SearchSecurity.com, find out what mobile security controls you need to consider when formulating an enterprise mobility strategy, so that you can reap the benefits of increased productivity and efficiency without putting your sensitive data at risk.

    Download

  • Top 10 cyber security stories of 2021

    Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.

    Download

  • CW EMEA July 2023: Can we trust AI?

    Artificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public.

    Download

  • Biometrics in the enterprise: An opportunity or an ethical minefield?

    Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.

    Download