You've requested...

Download this next:

Computer Weekly – 4 September 2018: Power Play – how GE builds digital into its products

In this week’s Computer Weekly, we speak to Bill Ruh, the head of GE Digital about how the business has changed to focus on customer outcomes following a change in senior leadership. The company is exploring new industries to take its Predix platform such the hospitality sector.  We look at the problems implementing SAP S/4 Hana and speak to experts about how maximise success. We also explore the challenges of networking microservices. Our CIO interview is PayPoint CIO Jon Marchant.

These are also closely related to: "Moving on Up"

  • Your Guide to Creating a Marketing Activity Taxonomy

    Marketing-speak can range from one organization to the next—a “program” to one person could be a “campaign” to you. That’s why creating a marketing activity taxonomy is crucial to every strategy.

    Download this expert guide to explore the differences between channels, programs and campaigns, and learn how you can create a common taxonomy to avoid terminology confusion.

  • Breaking Down the Log4j2 Attack

    In this webcast, Endace’s Michael Morris speaks with Cisco’s Value Chain Security Leader, Timothy Wilson-Johnston, about his professional experience and his thoughts on the Log4j2 attack.

    The two discuss open-source software vulnerabilities and remediation strategies, including the importance of managing version controls.

    Watch now to unlock the insightful conversation.

Find more content like what you just read:

  • Smart agriculture: Growing the future of farming

    Many think that agriculture would be one of the last industries that would need 5G connectivity. However, it has become crucial to their success. So, how can you customize private wireless networks to fit your most pressing needs and use cases? Watch this webinar to learn more.

    Download

  • Keep up with increased website traffic this holiday season

    In this eBook, you’ll learn about the importance of your website functionality to overall customer experience, and get tips for preparing your website infrastructure for increased traffic around the holiday season. Download your copy to get started.

    Download

  • CW ASEAN November 2016

    Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.

    Download

  • Computer Weekly – 2 August 2022: How to create a datacentre capacity plan

    In this week's Computer Weekly, planning datacentre capacity is a growing challenge – we ask the experts for the latest best practice. Victims of the Post Office IT scandal explain why they think they were targeted for speaking out. And we look at the digital skills gap in retail and find out how employers can source talent. Read the issue now.

    Download

  • MicroScope – June 2022: A return to face-to-face meetings

    With the world emerging from the pandemic, what role does the personal event and face-to-face meetings hold in business? Also read about the next step for the future of collaboration and communication services, and why there needs to be greater diversity across the channel

    Download

  • CIO Trends #7

    Read some of our most popular articles on issues faced by IT decision makers, such as how to get the most out of the internet of things, and how to tailor your IT operating model to fit in the digital age.

    Download

  • 6 Best Practices for IVR Scripting

    It’s critical for your IVR scripts to be simple, regularly updated, and agent accessible.But as customers continue to interact with voice calls, they also expect digital options, such as email, online chat, and social media. With all these choices, it can be difficult for companies to keep up with scripting. Access this article to learn more.

    Download

  • The All-in-One PDF and E-Signature Solution for Modern Business

    In this gated 15-minute video, Adobe Product Marketing Manager Garrett Schwartz interviews Adobe Director of Product Marketing for Acrobat for Business Alex Gay. Watch to discover insights into why the PDF continues to be a vital document format, and how Acrobat Pro is the all-in-one PDF and e-signature solution that all can benefit from.

    Download

  • Retail Industry Spotlight - How to Leverage Customer Data for a Strategic Competitive Advantage

    Today’s economy is driven by data, not by capital. Businesses that can harness, securely store, and analyze their customer data are the ones that will lead the way. Having a 3D view of your customers through data allows you to create personalized solutions that contribute to customer retention. Read on to learn how your businesses can do the same.

    Download

  • MicroScope – January 2021: Looking forward to the future

    In this issue of MicroScope, take a look at what the year ahead holds for the channel after a largely positive 2020. Also discover why IAM technology is so important for post-pandemic cloud computing, and what approaches are fundamental to finding business success

    Download

  • Cloud & DevOps: a guide to becoming a software-centric organisation

    Businesses are investing time and effort in building digitally-enabled services.  In this e-guide we look at how businesses can transform their software development teams to deliver software efficiently and reliably.

    Download

  • A CISO’s guide to reporting cyber risk to the board

    When reporting risk as a CISO, you must wrestle with the question of explaining technical problems to a largely non-technical audience. Access this e-book to learn how XM Cyber’s Attack Path Management is designed to provide the tools you need to bridge the gap of cyber risk reporting and deliver a quantifiable presentation of risk and ROI.

    Download

  • The CISO'S guide to metrics that matter

    According to a recent survey, 66% of security leaders have stated that executives and board members do not understand the value of the security technologies they’ve purchased. This CISO’s guide translates key security findings into simple understandable metrics so that non-security personnel can understand. Read on to learn more.

    Download

  • Evaluate and bolster your JavaScript security

    The merits of JavaScript speak for themselves, but due to JavaScript’s needing to be interpreted by a web application, it is always exposed, and predisposed to cyberattacks. Read now to learn more about the importance of protecting JavaScript and use the checklist to evaluate your current security and find out what you can do to build upon it.

    Download

  • Fail to prepare quality data, prepare to fail

    Fail to prepare, prepare to fail is an adage that never fails to lose its veracity. The same is true of using poor quality data, known to be the bane of the lives of data analysts, not to speak of organisations that yearn to be "data driven".

    Download

  • Media Consumption Study 2017 UKI

    The results of TechTarget and Computer Weekly's annual reader survey, which asks for feedback on readers' media consumption when considering an IT purchase, reveals the complexity of IT purchase decisions.

    Download

  • Media Consumption Study 2017 UKI Infographic

    The results of TechTarget and Computer Weekly's annual reader survey, which asks for feedback on readers' media consumption when considering an IT purchase, reveals the complexity of IT purchase decisions.

    Download

  • Cloud & Outsourcing - Why Partnering Strategies Matter

    Explore how outsourcing motivations have changed and why you should adapt your sourcing strategies to keep up.

    Download

  • 5th edition of the latest trends and insights for CIOs, CTOs and CDOs.

    Thie e-guide offers a collection of some of our most popular articles on issues faced by IT decision makers, such as how to get cloud implementations right and how and why men in the technology industry have helped women progress.

    Download

  • CIO Trends #6

    Read some of our most popular articles on issues faced by IT decision makers, such as how to get DevOps right in order to deliver digital transformation. We explore digital twins and how they could be used to optimise real-world industrial assets and whether Brexit uncertainty is still dominating digital leadership conversations across the UK.

    Download

  • Multi-cloud or just multiple clouds? How to augment your cloud strategy

    Discover in this e-book how Deloitte and Red Hat’s multi-cloud solutions can help your organization manage the critical pain points you likely experience when assembling the crucial components of your multiple-cloud environment.

    Download

  • CIO Trends #3

    This guide offers a collection of our most popular articles for IT leaders during the last part of 2016, looking at what it takes to be a great CIO and how to get the most out of your IT budget.

    Download

  • Computer Weekly - 16 March 2021: Containers play a key role in post-pandemic IT architectures

    In this week's Computer Weekly, our latest buyer's guide examines the key role that container technology will play in post-pandemic IT architectures. The UK government is under fire for its opaque approach to gigabit broadband strategy. And we assess the storage options for the growing volumes of unstructured data. Read the issue now.

    Download

  • Focus: Enterprise digital transformation

    In this e-guide we look at how businesses can stay on track through collaboration, innovation, listening to user needs and partnering with suppliers.

    Download

  • Is the Netherlands keeping up with modern pace of digital change?

    In this quarter's CW Benelux ezine, we ask whether the Netherlands is suffering from digital delusion and if it is losing ground in the digital world.

    Download

  • Real-time analytics extends the reach of its business value more and more

    Organisations increasingly value data that is as current as possible. And there are other sectors where real-time data analytics and data visualisation are proving valuable. In this e-guide, we discuss how continuous real-time analytics, operating at sub-second speed, are finding real-world applicability across several industry sectors.

    Download

  • CW Europe – December 2017

    In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.

    Download

  • Event recap: VMworld 2018 Europe

    It is the 20th anniversary year for VMware and at the VMware European conference in Barcelona, the company famous for its hypervisor, showcased how it had changed the face of IT, and where it was heading next.

    Download

  • Enterprise Labeling a Supply Chain Strategic Imperative

    Access this in-depth white paper to discover how to implement integrated, data-driven labeling in your supply chain management strategy.

    Download

  • Cloud networking and CDN: How to get the best for your business

    In this e-guide we will be looking at how to bring innovative new software-defined tools to bear on multicloud environments, uncover some of the potential pitfalls of cloud networks and (hopefully) how to avoid them, and take a swing through the related world of content delivery networks (CDNs).

    Download

  • Expert Checklist: 11 Steps for Aligning Your BC/DR Program with Business Needs

    This e-guide provides an expert checklist for developing a successful business continuity program, designed with the specific needs of your organization in mind.

    Download

  • Creating a Network Endpoint Security Policy for Hostile Endpoints

    Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.

    Download

  • Solution Spotlight: Enforcing Mobile Security Through Secure Endpoint, Access and Applications

    Implementing a sound mobile security system starts with understanding what tools are out there and how they can be used effectively. This white paper will help you understand the security controls available to protect your workers and organization. Read on to get started.

    Download

  • How Threat Intelligence Can Give Enterprise Security the Upper Hand

    Attackers and threats on security are advancing at an alarming rate and many enterprises are not able to keep up. Take a look at this guide to learn more about threat intelligence and how it can be incorporating into your current security program.

    Download

  • SIEM IT Decision Center- Checklist #2

    This white paper presents SIEM use cases and technical information for security and compliance pros to better understand the threat landscape and help move their RFP process forward.

    Download

  • Security & compliance automation for financial services

    A SANS Institute survey showed that unauthorized access is the No. 1 concern around cloud environments. This is especially true for businesses in financial services, who must maintain constant compliance amidst grueling regulations. By downloading this white paper, learn how automation can help these businesses remain both secure and compliant.

    Download

  • What to think about when utilizing endpoint securities

    There’s a lot to consider when establishing a proper endpoint security plan for your organization. And with so many tools available today, it is easy to forget the very basics of security. View this e-guide to help you refocus on the priorities and discover how to choose, keep or upgrade your endpoint security systems.

    Download

  • Defining and Enforcing a Clear Mobile Device Security Policy

    If you have not set up your mobile device security plan, this E-Guide from searchSecurity.com can help. Read on to discover the importance of a new mobile security strategy, what to consider, how to address BYOD, and more.

    Download

  • Enforcing Endpoint Security: Creating a Network Security Policy

    As more and more users utilize non-company-owned devices to gain access to corporate data, organizations must take new steps to prevent the risks and damages of hostile, malware-infested and non-compliant endpoints. Access this e-guide to explore how to create a network endpoint security policy as well as best practices for enforcing them.

    Download

  • Effective Ways to Search Log Files

    Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.

    Download

  • Endpoint Security IT Decision Center Handbook 1

    Access this expert handbook to explore why organizations need strong endpoint security today more than ever, and discover how software can balance blocking malicious network threats while also granting users access to sensitive data.

    Download

  • The various ways to fight new and emerging cybercrime

    Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.

    Download

  • Public Cloud Security Tips and Best Practices

    This expert E-Guide counts down 10 ways that that you can keep your applications safe in the public cloud. Also inside, uncover essential best practices for protecting your data and applications – read on to learn more.

    Download

  • EssentialEnterprise Mobile Device Security Controls and Policies

    In this expert guide from SearchSecurity.com, find out what mobile security controls you need to consider when formulating an enterprise mobility strategy, so that you can reap the benefits of increased productivity and efficiency without putting your sensitive data at risk.

    Download

  • Making Sure Your Identity and Access Management Program is Doing What You Need

    Identity and access management (IAM) can cause a multitude of issues within an organization if not managed properly. This expert guide explores how to ensure your identity and access management services enable and support the established CIO priorities.

    Download

  • December ezine: Tech for good

    Read about why more CEOs are discussing the positives of technology and why the channel will need to do the same

    Download

  • Defining Your Corporate Mobile Policies

    It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization

    Download