2015 Mobile Workforce Report: Rise of the Mobile Worker
By: Dimension Data View more from Dimension Data >>
Download this next:
UK IT Priorities 2016
By: TechTarget ComputerWeekly.com
Type: eGuide
Every year, Computer Weekly and TechTarget conduct a global survey of our readers to understand their technology spending priorities for the coming 12 months. Our research offers a unique insight into the purchasing decisions of IT decision-makers worldwide - and as such it's a valuable benchmark for IT leaders to compare and contrast their plans with their peers.
The IT Priorities survey looks in depth at the technologies under consideration in the key areas of IT infrastructure - from datacentres to storage, from software to networking, security, mobile, information management and cloud services.
The study is conducted with senior IT professionals and presents real-life insights into how organisations are spending their IT budgets.
These are also closely related to: "2015 Mobile Workforce Report: Rise of the Mobile Worker"
-
Middle East IT Priorities 2016
By: TechTarget ComputerWeekly.com
Type: eGuide
Computer Weekly’s annual global survey of readers has once again revealed what CIOs around the world, including an increasing number of Middle East based IT leaders, are planning over the next 12 months.
The study, conducted with senior IT professionals presents real-life insights into how organisations are spending their IT. It looks in-depth at the technologies under consideration in in the key areas such as storage, software, networking, security, mobile, and cloud services.
This year’s research revealed an appetite for mobility projects in the Middle East with 43% of IT leaders in the Middle East considering mobility projects in 2016. Read more and find out what CIOs in other countries across the EMEA region are planning.
-
Europe IT Priorities 2016
By: TechTarget ComputerWeekly.com
Type: eGuide
Every year, Computer Weekly and TechTarget conduct a global survey of our readers to understand their technology spending priorities for the coming 12 months. Our research offers a unique insight into the purchasing decisions of IT decision-makers worldwide - and as such it's a valuable benchmark for IT leaders to compare and contrast their plans with their peers.
The IT Priorities survey looks in depth at the technologies under consideration in the key areas of IT infrastructure - from datacentres to storage, from software to networking, security, mobile, information management and cloud services.
The study is conducted with senior IT professionals and presents real-life insights into how organisations are spending their IT budgets.
Find more content like what you just read:
-
The rise and rise of SD-WAN in post Covid-19
By: TechTarget ComputerWeekly.com
Type: eGuide
So much has been up in the air in the wake of the onset of Covid-19 and the lockdowns and stay-at-home orders issued by various governments around the world. But there has been one thing that is pretty fixed: the rise and rise of software-defined wide area networks (SD-WANs).
-
UK IT Priorities 2019
By: TechTarget ComputerWeekly.com
Type: eGuide
The results of our 2019 IT Priorities survey are in, and they show the good news that IT budgets are rising faster than they have for many years. Cloud remains the top spending priority for this year, but IT automation is growing fast as a major investment area.
-
UK IT Priorities 2019
By: TechTarget ComputerWeekly.com
Type: eGuide
The results of our 2019 IT Priorities survey are in, and they show the good news that IT budgets are rising faster than they have for many years. Cloud remains the top spending priority for this year, but IT automation is growing fast as a major investment area.
-
Top 10 IT security stories of 2018
By: TechTarget ComputerWeekly.com
Type: eGuide
The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
-
CW Buyer's Guide to Apple in the Enterprise
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This nine-page buyer's guide assesses the growth of Apple's computers and iPads in business and the enterprise.
-
CW Middle East ezine April 11 2019
By: TechTarget ComputerWeekly.com
Type: Ezine
It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.
-
Business Analytics: how AI is augmenting analysis, and bolstering data literacy shortfalls
By: TechTarget ComputerWeekly.com
Type: eGuide
Artificial Intelligence and human analysis have been coming together in recent years. Whether using packaged BI and data preparation tools, or languages like Python and R, business analysts and data scientists and engineers alike have been exploring the use of machine learning algorithms to augment their data analyses. Read more in this e-guide.
-
IT in Europe - May 2012
By: TechTarget Security
Type: Ezine
While network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.
-
Computer Weekly 3 September 2019: From IT disaster to digital innovation at RBS
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we meet the man brought in to turn around the technology at RBS Group after its catastrophic IT outage. We examine the latest best practice in securing mobile devices in the enterprise. And we look at progress towards "passwordless" security. Read the issue now.
-
Will mobile networks cope with the end of roaming charges?
By: TechTarget ComputerWeekly.com
Type: Ezine
Download this issue of Computer Weekly to discover how the industry must face up to the challenges of implementing the new rules, around mobile roaming charges.
-
Computer Weekly – 30 January 2018: Davos debates global tech risks
By: TechTarget ComputerWeekly.com
Type: eBook
In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.
-
Managed Print Services in the Cloud
By: TechTarget ComputerWeekly.com
Type: Analyst Report
Analysts Louella Fernandes and Clive Longbottom discuss the benefits of extending managed print services to the cloud.
-
Computer Weekly –11 April 2017: Virtual reality in healthcare
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how virtual reality technology is starting to be used to improve healthcare. We examine the new tax laws that are causing IT contractors to quit government digital projects. And we analyse the software licensing issues arising from SAP's recent court case over indirect access. Read the issue now.
-
CIO and leadership survey 2017
By: TechTarget ComputerWeekly.com
Type: Research Content
This survey of 80 CIOs and IT leaders by Coeus Consulting shows the technology and financial trends facing IT leaders and businesses.
-
Computer Weekly – 28 February 2017: Navigating software licences
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, after SAP won a court case against a major customer, Diageo, over software charges, we look at what this means for users. We talk to the IT consultancy that recruits only autistic IT professionals. And we look at the CIO's big challenges for the year. Read the issue now..
-
ITOps & service management: The state of play in APAC
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide on ITSM in APAC, find out how to keep IT operations running to empower a remote workforce, the advantages of cloud-based service management tools and how one Australian company is managing IT incidents amid a shorter development lifecycle.
-
Tackling Mobile Security and BYOD Risks
By: TechTarget Security
Type: eGuide
This expert guide from SearchSecurity.com examines the top risks of mobile security and what BYOD risks your enterprise could encounter, along with how you can rethink network security and take the steps needed to ensure a successful BYOD experience.
-
A Computer Weekly buyer's guide to networking for the modern workplace
By: TechTarget ComputerWeekly.com
Type: eGuide
The Covid-19 pandemic has transformed our networking habits. In this 17-page buyer's guide, Computer Weekly looks at how firms are coping with the shift to remote working, the new challenges facing IT leaders and the alternatives to strained virtual private networks.
-
Digital Disruption Index: Aligning strategy, workforce and technology
By: TechTarget ComputerWeekly.com
Type: Research Content
Business leaders' confidence in the digital capabilities of new entrants to the workplace has improved in the past six months, according to the Digital Disruption Index by Deloitte.
-
CW Buyer's Guide to 5G mobile networking
By: TechTarget ComputerWeekly.com
Type: eBook
5G mobile networking has the potential to propel business into the future. In this 17-page buyer's guide, Computer Weekly looks at how to optimise 5G, the advantages of advanced communications and what Télécoms Sans Frontières has achieved through harnessing it.
-
SD-WAN: Accelerating network transformation in APAC
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read more about SD-WAN's momentum in the Asia-Pacific region, and how the technology can support the requirements of a multi-cloud environment.
-
SD-WAN: Accelerating network transformation in APAC
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read more about SD-WAN's momentum in the Asia-Pacific region, and how the technology can support the requirements of a multi-cloud environment.
-
Is the Netherlands keeping up with modern pace of digital change?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this quarter's CW Benelux ezine, we ask whether the Netherlands is suffering from digital delusion and if it is losing ground in the digital world.
-
Computer Weekly buyer's guide to endpoint security
By: TechTarget ComputerWeekly.com
Type: Essential Guide
In this 11-page buyer's guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise's security policy.
-
The changing mobile platform landscape
By: TechTarget ComputerWeekly.com
Type: eGuide
So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.
-
CIO Trends #4: Nordics
By: TechTarget ComputerWeekly.com
Type: eGuide
Read analysis of some of the Nordic results from the Computer Weekly IT priorities survey for this year. Unsurprisingly, cloud computing is one of the biggest draws and more than half of CIOs in the region will spend more on cloud technologies this year than they did in 2016.
-
Why hyper-converged infrastructure could improve overall IT performance
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends.
-
A guide to developing modern mobile applications
By: TechTarget ComputerWeekly.com
Type: eBook
A key ingredient of eBusiness is the ability to offer customers the very best user experience, irrespective of whether they use a web browser, a mobile browser or a mobile app. In this guide, we explore the challenges organisations face in managing the numerous ways customers can transact with businesses.
-
Escaping legacy – removing a major roadblock to a digital future
By: TechTarget ComputerWeekly.com
Type: eBook
Core legacy systems inhibit businesses' ability to meet changing customer demands in the digital age. The scale and nature of the problem is such that it needs to be addressed now.
-
Unified Communications: the key to prospering in the new working reality of Covid-19
By: TechTarget ComputerWeekly.com
Type: eGuide
The coronavirus is changing everything about how people work, and will do so permanently. It added that even though the working world was experiencing unprecedented uncertainty, there were two things that should be borne in mind: the virus will pass, and at the other side of the pandemic, the world of work will look very different.
-
Quocirca: Selecting a cloud printing platform
By: TechTarget ComputerWeekly.com
Type: Resource
As IT teams are faced with managing printing across a hybrid workplace, cloud printing platforms offer a way of tracking, monitoring and securing print in the office and at home. With untrusted devices, such as home printers, posing a threat to IT security, cloud print platforms that support zero-trust environments should be deployed.
-
Computer Weekly 4 August 2020: The UK's $500m space technology gamble
By: TechTarget ComputerWeekly.com
Type: eGuide
In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.
-
Computer Weekly 4 August 2020: The UK's $500m space technology gamble
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.
-
Why Unilever combines IT with business
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how consumer goods giant Unilever has changed its thinking about IT to support a global digital transformation. The UK boss of Hewlett Packard Enterprise assesses progress after the first year since HP split in two. And we examine how software development is changing in the enterprise. Read the issue now.
-
Computer Weekly buyer's guide to mobile app development
By: TechTarget ComputerWeekly.com
Type: eBook
In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.
-
Computer Weekly - 23 November 2021: Can the tech community show how to save the world?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we report from the COP26 conference on how the tech world's collaborative open source model could help tackle climate change. Gartner has urged IT leaders to rethink their role as business come to rely on digital technologies. And we ask if your office security is at risk as staff return. Read the issue now.
-
MicroScope January 2014: A special issue looking at software defined networking
By: TechTarget Security
Type: Ezine
The first issue of 2014 provides some insight in managed services, software defined networking, security and data centres
-
Computer Weekly – 22 May 2018: GDPR is here – are you ready?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, the EU's new GDPR rules come into force this week – we ask if companies are ready and look at what happens if you're not compliant. Our latest buyer's guide examines digital transformation and the role of the CIO. And we find out how technology is changing the traditional sport of cricket. Read the issue now.
-
What is Digital Experience Monitoring (DEM)?
By: Nomios
Type: White Paper
The concept of Digital Experience Monitoring (DEM) is the process of measuring, analyzing, and optimizing the performance and UX of your digital applications and services. By focusing on how users interact with your platforms you will be able to identify issues or bottlenecks faster than before. Read on to learn more about this.
-
A Computer Weekly buyer's guide to modern enterprise resource planning
By: TechTarget ComputerWeekly.com
Type: eBook
The use of modern enterprise resource planning can make a business more agile. In this 14-page buyer's guide, Computer Weekly looks at how to best prepare for modernisation, the opportunity to build sustainably and how to unshackle your firm from unplanned upgrade needs.
-
Unified communications etiquette guide: What to know, what to avoid
By: TechTarget Security
Type: eGuide
This e-guide takes a close look at UC etiquette: what you should know and what you need to avoid. Uncover the different types of strategies, applications, platforms and models you’ll need to help your organization streamline business processes with collaborative communications.
-
2020 IT Priorities UKI Infographic
By: TechTarget ComputerWeekly.com
Type: eBook
Each year, Computer Weekly asks CIOs and senior IT decision makers what they will be investing in during the 12 months ahead. Access this infographic to find out the key spending priorities for decision makers in the UK and Ireland in 2020.
-
IAM: Key to security and business success in the digital era
By: TechTarget ComputerWeekly.com
Type: eGuide
As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
-
Expert Tips on Getting Mobile Securely with Virtual Desktops
By: TechTarget Security
Type: eGuide
In this expert eguide from SearchEnterpriseDesktop.com, find out why it is essential to secure all workers’ mobile devices.
-
Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now.
-
BYOD: The Evolution of Mobile Security
By: TechTarget Security
Type: eGuide
This expert guide takes an in-depth look at the new technologies and innovations that are driving the shift towards enterprise mobility, along with how to adapt your management strategy to best take utilize them.
-
Computer Weekly – 27 April 2021: Justice at last in Post Office IT scandal
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, 12 years after we broke the story, victims of the Post Office IT scandal finally have their criminal convictions overturned. We take a virtual tour of a Microsoft datacentre and meet a server called 'Mega-Godzilla Beast'. And we find out how technology is transforming Nationwide Building Society. Read the issue now.