You've requested...

 The Social Business - Advent of a new age

If a new window did not open, click here to view this asset.

Download this next:

Finding the right path forward for your sustainability transformation journey

Businesses globally have entered an era of sustainability transformation — an era defined by the direct link between efforts to address social issues and achieving lasting corporate growth.

But at the same time, the challenges at the forefront of modern enterprise are becoming far too complex for any one company or industry to solve.

So, what’s the answer? What’s the best step to take for a single organization?

Tune in to this short video to find out how Fujitsu can help your organization find the right path forward in your sustainability transformation journey.

These are also closely related to: " The Social Business - Advent of a new age"

  • Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?

    In this week’s Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. The Black Lives Matter movement has raised awareness of social inequalities, but is the tech sector succeeding in becoming more diverse? And we ask if business software should learn from the addictive nature of social apps.

  • CW Europe December 2019: Deutsche Bank creates innovation division

    German investment banking giant Deutsche Bank is opening a division focused on innovation as part of its plan to digitise all business operations. Read more details in this edition of CW Europe. Also read how software robots are helping social workers in Sweden, and why Chinese communications supplier Huawei has offered governments an anti-industrial espionage commitment.

Find more content like what you just read:

  • Increasing mammography use to reduce the death rate from breast cancer

    According to a CDC report, mammography utilization decreases with adverse social determinants of health.

    Download

  • Are we trusting social networks too much?

    This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks

    Download

  • Amplifying your webinar reach with social media

    Access Amplifying Your Webinar Reach with Social Media for tips on how to effectively utilize social content before, during, and after your webinar to create a scalable social media promotion plan that improves the ROI of your webinar programs.

    Download

  • CW Buyer's Guide to Emerging technology

    The way we work is changing with the exponential emergence of new technology. In this 15-page buyer's guide, Computer Weekly looks at the potential of DNA storage, how we can benefit from quantum computing in the future and the role of software in business development.

    Download

  • Computer Weekly – 17 November 2020: How Mastercard is taking digital payments into a new era

    In this week's Computer Weekly, we talk to Mastercard about how the credit card giant is using new technologies to take digital payments into a new era. After months of unprecedented uncertainty, we ask CIOs how they are planning for the next 12 months. And we examine how the growth in remote working will affect IT salaries. Read the issue now.

    Download

  • Computer Weekly - 30 November 2021: Digital beats - how Warner Music turned to the cloud

    In this week's Computer Weekly, we talk to the CIO of Warner Music about how cloud computing helps it meet the needs of music lovers. AstraZeneca discusses how its enterprise social media system helped through the pandemic. And we assess the tech sector's response to the government's plans to tackle digital skills shortages. Read the issue now.

    Download

  • Collaboration software in the era of Gen-Z

    In this e-guide, learn how Microsoft is dominating the Software-as-a-Service space thanks to its strength in collaboration software and how the new generation of collaboration software could be stoking communication overload. Also, check out our chart comparing Slack, Microsoft Teams and Spark.

    Download

  • The future of enterprise IT: Social, social, mobile, analytics and cloud

    Cloud and data technologies are allowing organizations to provide service levels not even dreamt of a few years ago. This guide looks at some examples of these technologies transforming organizations in South-East Asia.

    Download

  • The future of enterprise IT: Social, mobile, analytics and cloud

    Mobile and data technologies are allowing organisations to provide service levels not even dreamt of a few years ago. This guide looks at some examples of these technologies transforming organisations in Australia.

    Download

  • Leader’s guide to ESG: Top opportunities in 2023

    Environmental, social, and governance (ESG) mandates are top of mind for organizations everywhere. Explore this guide to 2023's top ESG opportunities, beginning with three ESG trends.

    Download

  • Step-by-step disaster recovery planning guide

    IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.

    Download

  • MicroScope: Grasp the social networking opportunity

    An issue looking at the issues around social media, the growth in unclouding and some security industry predictions for the year ahead.

    Download

  • Covid-19: An Infographic - 3 Immediate Actions for CIOs

    This infographic highlights the measures CIOs should be taking in the wake of COVID-19. Download now!

    Download

  • Computer Weekly – 6 September 2022: Out with the old at Asda

    In this week's Computer Weekly, we talk to Asda's CIO Carl Dawson about the supermarket's cloud-oriented renovation of its technology stack. We narrate the security woes at Twitter. And we examine best practices for data backup. Read the issue now.

    Download

  • Top 10 end-user computing stories of 2019

    IT has been looking at how desktop computing can enable employees to become more productive by using new forms of collaboration and enterprise social media platforms. Here are Computer Weekly's top 10 end-user computing stories of 2019.

    Download

  • CIO Trends #8: Nordics

    In this e-guide we take a look at how digital transformation is shaking up the Nordic region and placing CIOs at the forefront of the social and economic changes that come with it. Norway, Denmark, Sweden and Finland are all heading in the same direction at a pace. This e-guide features an article about each.

    Download

  • CIO Trends #8: Nordics

    In this e-guide we take a look at how digital transformation is shaking up the Nordic region and placing CIOs at the forefront of the social and economic changes that come with it. Norway, Denmark, Sweden and Finland are all heading in the same direction at a pace. This e-guide features an article about each.

    Download

  • The loan charge review, the Tech Talent Charter, and combatting loneliness

    In this week's episode of the Computer Weekly Downtime Upload podcast, Caroline Donnelly, Clare McDonald and Brian McKenna talk about the loan charge review bearing down on IT contractors, the Tech Talent Charter, and how remote workers can be socially included.

    Download

  • CIO Trends #10: Nordics

    Swedish people are pioneering when it comes to adopting the latest technologies. But this malleability to new tech has its limits. Read in this eguide how Swedish consumers are losing confidence in social media, with increasing distrust over personal data use and online privacy.

    Download

  • Computer Weekly – 28 March 2023: Is TikTok really a security threat to your business?

    In this week's Computer Weekly, with the UK government becoming the latest administration to ban TikTok, we ask whether the controversial social media app is really a security threat to enterprises. Read the issue now.

    Download

  • The UK manufacturing sector needs a digital upgrade

    In this week's Computer Weekly, the UK manufacturing sector is lagging behind on digital technology – we examine the challenges for the industry in becoming a global leader. Our buyer's guide looks at enterprise social media and collaboration tools. And we find out how data science is helping to boost cyber security strategies. Read the issue now.

    Download

  • NAS meets cloud and unstructured data challenges

    NAS file access storage has progressed to meet the challenges of the cloud era. This e-guide provides key insights into NAS as we know it in the era of cloud and big, unstructured data sets.

    Download

  • Computer Weekly - 9 March 2021: Are you ready to return to the office?

    In this week's Computer Weekly, a year after lockdown began, we look at employers' changing attitudes to returning to the workplace. We find out how the software developer community has coped during the Covid-19 pandemic. And we examine the cyber security concerns prompted by latest social media craze, Clubhouse. Read the issue now.

    Download

  • How AI is Impacting Healthcare

    President Biden's executive order focuses on the importance of secure and reliable Artificial Intelligence (AI) in various sectors, including healthcare.

    Download

  • Computer Weekly – 11 December 2018: Manchester's evolution from rag trade to digital hub

    This issue of Computer Weekly explores innovation in the digital era – from the role of software-defined networking in the datacentre, to quantum computing, and much more.

    Download

  • Computer Weekly - 24 March 2020: Making home working work - a guide for IT leaders

    In this week's Computer Weekly, with staff working from home during the coronavirus crisis, we look at three key technology areas to consider. We find out about a novel approach to teaching security awareness to users. And we examine the role of IT in corporate environmental, social and governance programmes. Read the issue now.

    Download

  • Hacking the Human Operating System

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

    Download

  • Infographic: Business email compromise red flags

    Business Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.

    Download

  • Personalized Recommendations Powered by Optimized AI

    Recommendation systems built with AI software and high-core-count processors deliver personalized suggestions to engage users. Learn how these systems work and the infrastructure needed to build effective, scalable recommenders. Read the full article to discover how Intel's solutions can improve your recommendation system.

    Download

  • 6 customer service channels you need to support

    Where should you allocate resources to most effectively engage with current and potential customers? In this expert e-guide, Scott Sachs of SJS Solutions weighs the pros and cons of the 6 main customer service channels: Chat/video chat, phone, email, social media, customer self-service, and mobile.

    Download

  • MicroScope – May 2022: Charging at SME security challenges

    With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working

    Download

  • CW Nordics February-April 2020: Swedes lose faith in social media as data security fears increase

    Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result.

    Download

  • Safety Meshing: Hybrid trust models in social networks for end-to-end encryption

    This article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.

    Download

  • Is your ECM system up to par?

    Access this expert e-guide to learn how older ECM tools are straining under increasing workloads and sub-par configurations. Also, explore how mobile, social, IoT, and other relatively new technologies are creating problems for ECM systems.

    Download

  • Computer Weekly – 24 January 2017: World leaders discuss risks of social unrest from advances in technology

    In this week's Computer Weekly, we examine the fears raised at the World Economic Forum over the potential for social unrest as technology transforms working practices. We hear from the CIO at the World Health Organization about how IT helped tackle the Ebola crisis. And we look at progress in adopting big data analytics. Read the issue now.

    Download

  • Breaking down ransomware threats: Guidance for defense

    To help you build up your defenses against ransomware, this 5-page guide breaks down common types of attacks and explores how you can prevent them. Continue on to unlock the full security insights.

    Download

  • Going big: why companies need to focus on operational analytics

    This report from Capgemini Consulting shows how the search for competitive advantage has driven organisations to shift the focus of their analytical efforts to back office operations

    Download

  • Computer Weekly – 25 July 2023: Getting comfortable with data

    In this week's Computer Weekly, we talk to the head of IT at furniture retailer DFS about building trust in data. The vulnerabilities in MOVEit software continue to attract new victims – we assess the impact of the breaches. And we find out how online investigators are trawling social media to gather evidence of war crimes. Read the issue now.

    Download

  • A Computer Weekly buyer's guide to Automating business processes

    Automating business processes can save time and money. In this 15-page buyer's guide, Computer Weekly looks at how BPA can expand into new areas, the opportunities artificial intelligence has to offer and why it's so important to assess what's working optimally.

    Download

  • How to improve agility with business process automation

    For business agility to happen, organizations need an event-driven workflow automation tool capable of cross-domain automation with enterprise grade support. View one such solution, Orchestral.ai’s Composer tool in this product overview resource.

    Download

  • Deloitte Global CIO Survey 2018 – UK Edition

    Fewer than 10% of CIOs identified themselves and their companies as being advanced in the journey to incorporate technology into their digital business strategies, Deloitte's 2018 CIO survey reveals in the UK edition of its 2018 global CIO survey, Manifesting Legacy: Looking Beyond the Digtal Era.

    Download

  • BrightTALK Professional Engagement Survey 2022

    BrightTALK wants to hear from you! We are conducting our annual survey and we'd love to learn about how you research industry topics and engage with content. This survey digs into how you keep up-to-date on industry trends, the type of content that interests you, and how you currently consume digital content.

    Download

  • BrightTALK Professional Engagement Survey 2022

    BrightTALK wants to hear from you! We are conducting our annual survey and we'd love to learn about how you research industry topics and engage with content. This survey digs into how you keep up-to-date on industry trends, the type of content that interests you, and how you currently consume digital content.

    Download

  • Security leader’s guide to AI-based scams

    The capabilities of large language models (LLMs) and generative AI are rapidly evolving. This white paper describes how hackers are utilizing generative AI to fuel cyberattacks, scams, and other social engineering related threats. Read on to learn more.

    Download

  • Computer Weekly Buyer's Guide: Identity and Access Management

    When used effectively, identity and access management can streamline business processes. In this 17-page buyer's guide, Computer Weekly looks at the challenges it can bring large companies, the implications of cloud and how to pick the right service for your firm.

    Download

  • RPA vs. BPM: How are they different?

    Robotic process automation and business process management are complementary partners in driving digital transformation initiatives. RPA has received a lot more publicity in recent years, but BPM is an essential discipline and a key enabler in scaling RPA projects. Here are the main differences between these process-oriented initiatives.

    Download

  • Analyst report: Comparing mainframe-as-a-service vendors

    Legacy mainframe systems are complex and slow to change, thereby reducing business agility and holding back growth. Tap into this analyst report to learn what ISG perceives as most critical factors for mainframes services and solutions in 2023 and gain a deeper understanding of different mainframe-as-a-service (MFaaS) vendors and how they stack up.

    Download