CEA Reports

Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by TechTarget Customer Experience
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

TechTarget Customer Experience

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Computer Weekly – 9 July 2013: The most influential women in UK IT
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we unveil our list of the 25 most influential women in UK IT, and talk to the winner - Tech City CEO Joanna Shields. We hear from oil giant BP about how it moved to a hybrid cloud environment. And we examine the changing nature of the outsourcing market and what it means for IT managers.
Posted: 08 Jul 2013 | Published: 09 Jul 2013

TechTarget ComputerWeekly.com

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

SharePoint E-Zine Volume 8: Must-have Free SharePoint Tools and Add-ons
sponsored by TechTarget Search Windows Server
EZINE: In this issue you will learn about some handy tools and utilities that are helpful to fill in SharePoint functionality gaps.
Posted: 13 Mar 2009 | Published: 13 Mar 2009

TechTarget Search Windows Server

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

CW Europe - September-November 2022: Why Russia could become the world's biggest market for illegal IT
sponsored by TechTarget ComputerWeekly.com
EZINE: Faced with international sanctions and the departure of many global IT suppliers from Russia, companies there are seeking alternative, and sometimes illegal, routes to access IT products. Also read how new requirements are driving scientists and engineers in Europe back to the lab to start developing 6G technology.
Posted: 01 Sep 2022 | Published: 09 Sep 2022

TechTarget ComputerWeekly.com

CW ASEAN: Trend Watch – Security
sponsored by TechTarget ComputerWeekly.com
EZINE: Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.
Posted: 08 Feb 2021 | Published: 18 Jul 2019

TechTarget ComputerWeekly.com

Information Governance Strategy: Developing a Roadmap for Managing Corporate Info
sponsored by TechTarget Content Management
EBOOK: Most organizations are looking for ways to better manage their structured and unstructured data – and information governance has the potential to do so. But implementing an effective program can be tricky. Review this e-book to gain practical tips on how to implement an information governance program, learn 5 pitfalls to avoid, and more.
Posted: 05 Sep 2012 | Published: 01 Sep 2012

TechTarget Content Management

Computer Weekly – 8 July 2014: The most influential women in UK IT
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal our annual list of the 25 most influential women in UK IT – female IT leaders making a difference to the digital economy. We look at how to integrate iPads into the corporate IT infrastructure. And we profile enterprise software upstart Workday as it challenges Oracle and SAP. Read the issue now.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

TechTarget ComputerWeekly.com

Presentation Transcript: Redefining Storage Scalability for Cloud Computing and Big Data
sponsored by DataDirect Networks
PRESENTATION TRANSCRIPT: View the solutions that have been developed for optimizing Big Data for private and public Cloud Computing, as well as setting a path to Exascale computing. Find solutions around how to remove Big Data storage scalability as the bottleneck in your workflow.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

DataDirect Networks

Computer Weekly – 22 August 2023: Can low code/no code ease developer skills shortages?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with organisations increasingly turning to low-code/no-code tools to enable "citizen developers" among staff – we look at whether this can help to ease software developer skills shortages. Read the issue now.
Posted: 21 Aug 2023 | Published: 22 Aug 2023

TechTarget ComputerWeekly.com

IT in Europe: Taking control of smartphones: Are MDMs up to the task?
sponsored by TechTarget Security
EZINE: In this Special European edition of Information Security magazine, gain key insight into the increasing risks of mobile devices and the strategies and tools needed to mitigate them. View now to also explore VDI security, cybersecurity threats, IT consumerization deluge, and much more.
Posted: 23 Feb 2012 | Published: 23 Feb 2012

TechTarget Security

May Information Security Magazine
sponsored by TechTarget Security
EZINE: This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
Posted: 29 Apr 2013 | Published: 29 Apr 2013

TechTarget Security

Computer Weekly – 20 March 2012: The open data revolution
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week’s Computer Weekly, Cabinet Office minister Francis Maude talks about releasing government datasets to the public and why open data will drive the next industrial revolution. We also review the latest test version of Windows 8 and see how it shapes up for tablet computers and business users and much more.
Posted: 19 Mar 2012 | Published: 20 Mar 2012

TechTarget ComputerWeekly.com

Information Security Magazine - April 2010: Endpoints on the Loose
sponsored by Information Security Magazine
EZINE: This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more.
Posted: 07 Apr 2010 | Published: 07 Apr 2010

Information Security Magazine