CIO Decisions eZine June
By: TechTarget View more from TechTarget >>
Download this next:
Capitalizing on Big Data
By: TechTarget Business Analytics
Type: eGuide
In the age of big data, the ability to collect, process, and analyze large data sets is quickly becoming a competitive necessity. So what should you know in order to capitalize on big data and drive success?
This expert e-guide from SearchBusinessAnalytics.com explores the growing need for data-driven decision-making skills, and reveals Gartner’s basic business rules for capitalizing on big data. Read on to learn more.
These are also closely related to: "CIO Decisions eZine June"
-
How long does it take to get owned?
By: TechTarget ComputerWeekly.com
Type: Research Content
This article is based on the thesis - How long does it take to get owned? - a study to investigate
the amount of time that it takes for stolen credentials to be used by a hacker. It describes the
design of fake online identities (“honey identities”), an infrastructure for monitoring their activity
and an experiment to test the developed prototypes in which we discovered that it can take as
little as 34 minutes for a leaked password to be used. -
Computer Weekly – 25 June 2019: Saving bees with the internet of things
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week’s Computer Weekly, we find out how internet of things technologies and “smart hives” are helping conservation efforts and insights into the life of bees. We examine Facebook’s new digital currency, Libra, and analyse its pros and cons. And we look at how IT leaders are rising to the challenge of delivering ethics and sustainability in tech. Read the issue now.
Find more content like what you just read:
-
Leveraging Agile in 2024 as a medium- or large-sized business
By: Digital.ai
Type: Research Content
Small organizations continue to report that Agile is a powerful productivity framework showing obvious benefits; larger companies, however, are seeing substantive barriers to organization-wide adoption. Explore research on the State of Agile in 2023 to better understand how to leverage and empower Agile as a medium-sized or large business.
-
The Evolution of the ‘Big Data’ Concept
By: TechTarget Business Analytics
Type: eGuide
Access this exclusive guide to analyze the evolution of the big data concept. Examine how many analysts are coming to believe that the 3-V definition falls short. Continue on to delve further into the big data discussion and discover how Gartner, who originally introduced the 3-V concept, has begun to build on this rudimentary interpretation.
-
Computer Weekly - 1 June 2021: The technology that enabled Covid-19 genome sequencing success
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we talk to the scientists behind the UK's gene sequencing work during the coronavirus pandemic to find out how cloud and data analytics enabled their success. It's three years since GDPR entered into law – we assess its progress. And we examine low-code software development for a small business. Read the issue now.
-
Enterprise Strategy Group evaluates ransomware detection methods
By: Intel
Type: ESG Showcase
ESG analysts recommend combining software security tools with hardware-based threat detection to prevent ransomware attacks. Read this ESG Showcase to find out how hardware-based detections work, and to view a potential solution in Intel Threat Detection Technology integrated with Check Point Harmony for comprehensive endpoint protection.
-
-
Who should get the technology vote in the UK General Election?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we take an in-depth look at the technology and digital policies in the main political parties' election manifestos. We examine the rise of alternatives to relational databases that better support a big data environment. And we assess the security issues around container technology. Read the issue now.
-
The cyber-resilient organization: Maximum preparedness with bulletproof recovery
By: Commvault
Type: Analyst Report
To be truly resilient, companies must make proactive efforts to enhance detection, accelerate response times, and ensure rapid recovery in the event of an attack. Download this white paper from Commvault and IDC to gain insights from 500 global IT and security professionals on how to build a cyber-resilient organization.
-
The state of threat intelligence
By: Mimecast
Type: Analyst Report
The threat intelligence industry is estimated to double within the next 5 years, surpassing $20 billion in annual sales. But security professionals continue to struggle with the abundance of information generated by these systems, undermining the technologies many benefits. Download this report to learn about the state of threat intelligence.
-
UKTech50 2021 - The most influential people in UK technology
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide: Computer Weekly has announced the 11th annual UKtech50, our definitive list of the movers and shakers in UK technology – the CIOs, industry executives, public servants and business leaders driving the role of technology in the UK economy.
-
December ezine: Tech for good
By: MicroScope
Type: Ezine
Read about why more CEOs are discussing the positives of technology and why the channel will need to do the same
-
How intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks
By: TechTarget ComputerWeekly.com
Type: Research Content
This article in our Royal Holloway security series explains how intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks
-
Computer Weekly – 17 April 2018: Can China's Alibaba successfully take on the US public cloud giants?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, as Chinese cloud provider Alibaba grows its presence in Europe, we ask if it can compete with the US public cloud giants. A government plan to move data policy has caused controversy among Whitehall digital experts – we find out why. And we assess the use of cloud for disaster recovery. Read the issue now.
-
Deloitte Global CIO Survey 2018 – UK Edition
By: TechTarget ComputerWeekly.com
Type: Research Content
Fewer than 10% of CIOs identified themselves and their companies as being advanced in the journey to incorporate technology into their digital business strategies, Deloitte's 2018 CIO survey reveals in the UK edition of its 2018 global CIO survey, Manifesting Legacy: Looking Beyond the Digtal Era.
-
Finding the right POTS replacement strategy for your organization
By: ARG, Inc.
Type: Data Sheet
Check out this data sheet to learn about 3 POTS/analog line replacement options as the Verizon Business 2022 deadline approaches.
-
MicroScope – April 2022: Can life ever really be simple for partners?
By: MicroScope
Type: Ezine
In this issue, discover whether simplifying programmes and interactions with partners is achievable, and what barriers stand in the way for vendors looking to make life easier. Also read about why reskilling in a post-pandemic world is key to boosting industry, and learn about what to expect from the manufacturing sphere over the next year
-
The Great Decommission
By: ARG, Inc.
Type: Blog
Analog lines or plain old telephone service (POTS) are steadily being decommissioned, with the FCC reporting that carriers are on a path to drop POTS lines entirely within 5 years. To avoid getting disconnected, access this article to help find the right POTS replacement strategy for your organization.
-
Computer Weekly - 17 December 2019: How data analytics is improving the world's greatest tennis players
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we talk to the organisation that runs men's tennis worldwide to find out how data analytics is transforming the sport. Intel processors delays will affect Windows 10 upgrades – we examine the implications. And we ask if AI is living up to the hype in enterprise IT. Read the issue now.
-
8-page paper: Why use wireless WAN for branch networks?
By: Cradlepoint
Type: White Paper
How can you mitigate the risk of downtime for your branch network? This 8-page white paper by Cradlepoint, “6 Wireless Failover Strategies for Enterprise Branch Continuity,” provides expert recommendations. Download the paper to unlock those insights.
-
A Computer Weekly buyer's guide to supply chain resilience
By: TechTarget ComputerWeekly.com
Type: eGuide
The Covid-19 pandemic has put the limits of the supply chain to the test. In this 18-page buyer's guide, Computer Weekly looks at how supply chain management has changed since, what action has been taken to handle it, and why data and automation is enhancing adaptability.
-
Supply chain management balance shifts from efficiency to resilience under Covid
By: TechTarget ComputerWeekly.com
Type: eGuide
This e-guide explores these matters, beginning with a comprehensive article that ranges over supply chain management, from a macro level through how trading platforms have been flexed to switch suppliers rapidly down to how robots have been quickly deployed to solve problems of scale.
-
Top 10 end-user computing stories of 2019
By: TechTarget ComputerWeekly.com
Type: eGuide
IT has been looking at how desktop computing can enable employees to become more productive by using new forms of collaboration and enterprise social media platforms. Here are Computer Weekly's top 10 end-user computing stories of 2019.
-
Computer Weekly – 14 August 2018: Infrastructure under attack
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.
-
Cloud native security: Best practices, tools & technologies
By: Palo Alto Networks
Type: Analyst Report
As more and more applications are migrated into the cloud, and organizations focus less on their own on-premises hardware, countless cloud and app security questions have arisen. This State of Cloud Native Security Report delves into the current market landscape for cloud and cloud-native security.
-
Today's top IT trepidations: Mobile security takes the cake
By: TechTarget Security
Type: eGuide
TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.
-
CW ASEAN – September 2018: Time to clear DevOps hurdles
By: TechTarget ComputerWeekly.com
Type: Ezine
ASEAN organizations are generally aware of the benefits of DevOps, but lesser known are the pathways to success. What would an organization that has successfully implemented DevOps look like?
-
CIO Trends #2: Nordics
By: TechTarget ComputerWeekly.com
Type: eGuide
Computer Weekly talks to more IT leaders than any other publication, and our reporters gather in-depth insights into the challenges facing CIOs, CTOs and CDOs. This guide offers a collection of our most popular articles for IT leaders,
-
Top 10 Australia IT stories of 2018
By: TechTarget ComputerWeekly.com
Type: eGuide
In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at what the country is doing to cement its position as a leader in mastering and deploying advanced information and communications technology across a large segment of its economy.
-
Jargon Buster Guide to Voice over IP (VoIP)
By: TechTarget ComputerWeekly.com
Type: eGuide
In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
-
Storage performance: From fundamentals to bleeding edge
By: TechTarget ComputerWeekly.com
Type: eGuide
In this guide we look at LUN provision and management, RAID and flash storage, plus tuning for analytics workloads and key emerging technologies that can give your organisation a competitive advantage in mission-critical operations, such as storage-class memory, NVMe flash and persistent memory.
-
VoIP has never lost its voice: How to get the most out of your business communications
By: TechTarget ComputerWeekly.com
Type: eBook
In today's comms world, and especially with regard to hybrid working, a communications identity has now become a unified calling and collaboration endpoint, one which is part of a suite of business services spanning voice, security and network-as-a-service solutions to power the mobile workforce.
-
Ultimate guide to digital transformation for enterprise leaders
By: TechTarget ComputerWeekly.com
Type: eGuide
This in-depth guide explains what digital transformation is, why it is important and how enterprises can successfully transition to this new business paradigm.
-
A Computer Weekly buyer's guide to CIO leadership
By: TechTarget ComputerWeekly.com
Type: eBook
In this 14-page buyer's guide, Computer Weekly looks at how the age of the customer requires IT leaders to focus on both the business technology and IT agendas; why IT leaders need to use blogging and social media to raise their profile and build influence in their organisations.
-
Computer Weekly – 25 April 2023: Aston Martin Formula One: Driven by data
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we speak to Aston Martin Formula One's Clare Lansley to find out how digital transformation helps the team to move further up the F1 grid. We explore how automation and AI is helping businesses tackle rising costs and also look into the maturity of Industry 4.0 initiatives. Read the issue now.
-
Risk management: 5 stages to compliance
By: ServiceNow
Type: White Paper
Maturing your risk management program is vital for meeting enterprise-wide objectives. Get insights on how you can raise the maturity level of enterprise risk management. You’ll discover how your teams can make better decisions that lead to greater outcomes, by connecting business and IT with a common language on a single platform.
-
What's going to impact channel in 2017?
By: MicroScope
Type: Ezine
Is the year ahead a bright one for channel? In this January 2017 edition of MicroScope E-zine, uncover the key expectations for channel in 2017.
-
CIO Trends #9
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, take a look at some of our most popular articles on issues faced by IT decision-makers, such as the rise in IT buying decisions from outside the IT department, the importance of ethics in technology, and a look at how the Department for the Environment, Food and Rural Affairs is preparing its IT for the challenges of Brexit.
-
Computer Weekly – 29 September 2020: How supply chain management is changing after Covid-19
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we examine the profound changes in supply chain management as a result of the global pandemic. We find out how digital experience platforms can help deliver an omni-channel web presence. And we look at the role of technology in cracking down on international money laundering. Read the issue now.
-
Fail to prepare quality data, prepare to fail
By: TechTarget ComputerWeekly.com
Type: eGuide
Fail to prepare, prepare to fail is an adage that never fails to lose its veracity. The same is true of using poor quality data, known to be the bane of the lives of data analysts, not to speak of organisations that yearn to be "data driven".
-
CW Nordics November 2016
By: TechTarget ComputerWeekly.com
Type: Ezine
This quarter, we look at the impact of Nokia layoffs on Finland, and in particular the city of Espoo which is home to both Nokia and Microsoft's Finnish headquarters. We also look at how Denmark's Bang & Olufsen is taking control of sales data with cloud-based software.
-
Computer Weekly - 2 March 2021: The most influential people in UK technology
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we reveal our annual list of the 50 most influential people in UK IT, and talk to this year's winner, NHS Digital CEO Sarah Wilkinson, about an unprecedented year of challenges. Also, we examine the best software patching strategies and see how the pandemic has affected women in tech. Read the issue now.
-
Computer Weekly 17 July 2018: How container technology is evolving
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, as adoption of containers grows rapidly, we look at the choices and potential benefits of the technology, the efforts being made to secure internet of things devices and how the latest Brexit plans will affect the UK tech sector. Read the issue now.
-
Your walkthrough of sustainable manufacturing innovations
By: Fujitsu
Type: Blog
Explore in this blog post how next-generation manufacturing can perpetuate sustainability and efficiency through today’s top innovations.
-
Policing cyber crime
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
-
CW ANZ Jan 2019: Keeping pace with microservices
By: TechTarget ComputerWeekly.com
Type: Ezine
In this edition of CW ANZ, we look at how enterprises are using microservices to solve problems and the challenges they are facing in moving to this new paradigm in software development. Read the issue now.
-
Revolutionizing Unified Communications Solutions with the Cloud
By: CBTS
Type: White Paper
Download this white paper to explore how cloud-based UC can give your IT staff more freedom and flexibility.
-
CW Middle East July to Sept 2016:
By: TechTarget ComputerWeekly.com
Type: Ezine
In this issue of CW Middle East we look at how CIOs in the region are formulating their virtualisation strategies as organisations warm to the benefits of cloud computing.
-
IT Project: DevOps
By: TechTarget ComputerWeekly.com
Type: eGuide
2016 is widely tipped to be the year DevOps goes mainstream, with enterprise IT managers either looking to ramp up or kick-start their efforts in this area, and start realising the benefits it can bring.