All Research Sponsored By:TechTarget ComputerWeekly.com

Computer Weekly - 20 December 2022: The Post Office IT scandal - cock-up or cover-up?
EZINE: In this week's Computer Weekly, the Post Office IT scandal inquiry continues to reveal shocking details – we review the latest evidence. We examine progress of the roll-out of fast broadband across the UK. And as the Online Safety Bill returns to Parliament, we look at the arguments about how to keep the internet safe. Read the issue now.
Posted: 16 Dec 2022 | Published: 20 Dec 2022


Nominations open for Computer Weekly Innovation Awards APAC 2023
LANDING PAGE: Computer Weekly is looking for nominations for the annual Innovation Awards to honour digital transformation initiatives in Asia-Pacific that have transformed organisations in six industries. Download the nomination form to share your organisation's success story.
Posted: 15 Dec 2022 | Published: 15 Dec 2022


The enterprise guide to video conferencing in 2023
EGUIDE: With all the broad technology shifts that have taken place during the pandemic, networked resources have become most vital. With the continued demand for conferencing services, the total addressable market size of communications and collaboration products and services will continue at a fair clip.
Posted: 14 Dec 2022 | Published: 14 Dec 2022


Real-time analytics extends the reach of its business value more and more
EGUIDE: Organisations increasingly value data that is as current as possible. And there are other sectors where real-time data analytics and data visualisation are proving valuable. In this e-guide, we discuss how continuous real-time analytics, operating at sub-second speed, are finding real-world applicability across several industry sectors.
Posted: 14 Dec 2022 | Published: 14 Dec 2022


CW APAC: Tech career guide – women in IT
EZINE: In this handbook, focused on tech careers for women in the Asia-Pacific region, Computer Weekly looks at what can be done to attract more women into software development.
Posted: 13 Dec 2022 | Published: 15 Dec 2022


Computer Weekly - 13 December 2022: AI experts question tech industry's ethical commitments
EZINE: In this week's Computer Weekly, the proliferation of ethical frameworks has done little to change how artificial intelligence is developed – we look at the challenges. We examine the future of the UK semiconductor sector as the government launches a review. And we hear how NatWest has put data at the heart of customer strategy. Read the issue now.
Posted: 13 Dec 2022 | Published: 13 Dec 2022


A Computer Weekly buyer's guide to anti-ransomware
EBOOK: The threat of ransomware looms large over business. In this 16-page buyer's guide, Computer Weekly looks at prevention methods, data defence and how to minimise the impact of a potential attack.
Posted: 12 Dec 2022 | Published: 12 Dec 2022


The future is SASE: Transform your enterprise network for good
EBOOK: Less than a year after it received an official name, Secure Access Service Edge has started to disrupt the networking and security markets. As incumbent vendors make strategic moves to build SASE offerings, the nascent technology has the potential to upend traditional networking and security.
Posted: 05 Dec 2022 | Published: 05 Dec 2022


Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
EZINE: In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022


6 data preparation best practices for analytics applications
EGUIDE: Amid issues of data sources, data silos and data quality, the process of collecting and prepping data for analytics applications requires a practical and effective approach. In this infographic, we put together 6 data preparation best practices for analytics applications to help enterprises master their data.
Posted: 29 Nov 2022 | Published: 29 Nov 2022


10 steps to building a data catalog
EGUIDE: Building a data catalog is an important initiative for many IT and data management teams. But organizations shouldn't undertake a data catalog project without getting input from business users. In this e-guide, learn why data catalogs have become a core component of the data management environment, and the 10 steps to build a data catalog.
Posted: 29 Nov 2022 | Published: 29 Nov 2022


Guide to building an enterprise API strategy
EGUIDE: Today's businesses run on software, which must interoperate with myriad other software platforms. How can a business offer its data and computing capabilities to potential users without revealing the underlying source code? In this e-guide we explore the benefits of APIs, how to build an API strategy and why it is so important to have one in place.
Posted: 29 Nov 2022 | Published: 29 Nov 2022


Computer Weekly - 29 November 2022: How to stop data retention from killing the planet
EZINE: In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.
Posted: 28 Nov 2022 | Published: 29 Nov 2022


CW Europe - December 2022 - February 2023: Finland prepares for drone technology take-off
EZINE: Finland is preparing for a future where it could rely on flying drone technology. Read about its plans in this issue. Also find out how a PhD student in the Netherlands is helping to detect hidden messages on the internet by using steganography.
Posted: 23 Nov 2022 | Published: 08 Dec 2022


Cloud networking vs. Cloud computing
EGUIDE: Organizations might sometimes consider cloud computing and cloud networking as interchangeable due to their similarities. But the two strategies have different goals and processes. In this infographic, learn more about the main features, uses and benefits of each of them.
Posted: 22 Nov 2022 | Published: 22 Nov 2022


IT Basics: Real-time Analytics
EGUIDE: In this new Computer Weekly series of e-guides, learn more about essential IT concepts, their definitions, applications and benefits. To start, we get together everything you need to know about real-time analytics, its uses and its benefits.
Posted: 22 Nov 2022 | Published: 22 Nov 2022


A Computer Weekly buyer's guide to financial analytics for planning
EBOOK: The current economic climate provides a strong reason for firms to turn to the advantages of software. In this 14-page buyer's guide, Computer Weekly looks at the role of datasets in accounting, how technology is helping finance departments control budgets and the importance of integrating automation into business processes.
Posted: 22 Nov 2022 | Published: 22 Nov 2022


CW APAC, November 2022: Trend Watch: Artificial intelligence in APAC
EZINE: In this handbook, focused on the adoption of artificial intelligence (AI) in Asia-Pacific, Computer Weekly looks at what stands in the way of AI adoption, Dell's deep learning model and how AI can realise its potential in healthcare.
Posted: 21 Nov 2022 | Published: 21 Nov 2022


A guide to what to look for in Application Performance Monitoring and Observability
EBOOK: In this E-Guide, we explore the market for APM tools, their role as part of a wider security strategy and look at how APM should be tied to business metrics.
Posted: 21 Nov 2022 | Published: 21 Nov 2022


Computer Weekly – 22 November 2022: Cyber criminals target World Cup Qatar 2022
EZINE: In this week's Computer Weekly, as the FIFA World Cup opens in Qatar, we examine the cyber security threats from criminals targeting the event. We report from the Gartner Symposium on the latest predictions for enterprise software development. And we talk to the CIO of Kyiv City Council about managing IT in the shadow of war. Read the issue now.
Posted: 18 Nov 2022 | Published: 22 Nov 2022


CW Nordics - November 2022 - January 2023: Icelandic datacentres point way to greener IT
EZINE: Iceland may soon become even more attractive to firms wanting to minimise their carbon footprint while using high-performance computing services. Read more about it in this issue. Also find out how a robo investment company, Nord Investments, is harnessing open banking to make thing easier for its clients.
Posted: 16 Nov 2022 | Published: 24 Nov 2022


Computer Weekly – 15 November 2022: How to protect against ransomware attacks
EZINE: In this week's Computer Weekly, we look at how to prepare for and protect against ransomware, and what to do if you're hit by an attack. We gauge industry reaction to Ofcom's plan to investigate the big three cloud providers. And we find out how travel giant TUI is implementing self-service analytics. Read the issue now.
Posted: 11 Nov 2022 | Published: 15 Nov 2022


A Computer Weekly buyer's guide to API management
EGUIDE: Application programming interfaces define the correct way for a developer to request services from an operating system. In this 14-page buyer's guide, Computer Weekly looks at how they provide connectivity, the key role of digital bonding, and the importance of keeping APIs up to date and secure.
Posted: 08 Nov 2022 | Published: 08 Nov 2022


IT Priorities Survey 2023
LANDING PAGE: IT Priorities Research Program for 2023 is here! Your thoughtful response to this survey will help us better understand what is changing with your IT priorities. Our editorial team will use this information to better address your challenges when approaching upcoming technology purchases and business plans for 2023.
Posted: 24 Nov 2022 | Published: 13 Oct 2022


Top 4 mobile security threats and challenges for businesses
EGUIDE: Mobile is quickly becoming one of the most used endpoints in the enterprise. However, there is a common misconception that mobile devices don't need protection, which is just not true. In this infographic, we put together four of the top mobile security threats, and steps IT organizations can take to protect these critical endpoints.
Posted: 22 Nov 2022 | Published: 22 Nov 2022