All Research Sponsored By:TechTarget ComputerWeekly.com

The key differences between DaaS and VPN
INFOGRAPHIC: Remote access to corporate resources is essential to ensuring business continuity, and there are a variety of ways to provide this access. VPN and DaaS can both give remote users access to an organization's resources, but they differ in key ways such as user-friendliness, performance, security and manageability.
Posted: 22 Jun 2022 | Published: 22 Jun 2022


CW Middle East - July-September 2022: UAE citizens embrace new digital technologies
EZINE: A survey shows that people in the United Arab Emirates believe next-generation technologies such as 3D printing and artificial intelligence will become widespread in the country. Also read how the UAE has improved its security posture amid mounting cyber threats.
Posted: 22 Jun 2022 | Published: 07 Jul 2022


A Computer Weekly buyer's guide to the circular economy
EBOOK: Increasing environmental concerns have made companies consider the circular economy model. In this 17page buyer's guide, Computer Weekly looks at how organisations can become more sustainable, whether Amazon's server pledge will catch on and how CIOs can adapt their procurement strategies to fight climate change.
Posted: 20 Jun 2022 | Published: 20 Jun 2022


Computer Weekly – 21 June 2022: Dreams come true – how data and communication saved a failing company
EZINE: In this week's Computer Weekly, the former CEO of bed retailer Dreams explains how digital, data and communication helped turn round a failing company. The UK government has a new digital strategy – but it all seems rather familiar. And we talk to the tech firms trialling a four-day working week. Read the issue now.
Posted: 17 Jun 2022 | Published: 21 Jun 2022


Infographic: 5 considerations before buying data center backup software
EBOOK: Trying to cross-correlate how one vendor implements a product feature and comparing it to another vendor's features can be a daunting task. Backup and recovery software moves data through almost the entire data center infrastructure, so implementing it, training staff and obtaining support for it is no small feat.
Posted: 14 Jun 2022 | Published: 14 Jun 2022


Computer Weekly – 14 June 2022: Managing Apple Macs in the enterprise
EZINE: In this week's Computer Weekly, with more people working remotely, the use of Apple Macs in the enterprise is growing – we look at how to manage them securely. Our latest buyer's guide examines security in the supply chain. And 10 years on from the London Olympics, we find out how data innovation is revitalising its legacy. Read the issue now.
Posted: 13 Jun 2022 | Published: 14 Jun 2022


How to modernize your legacy ERP system in 5 steps
INFOGRAPHIC: Staying with a legacy ERP system may be the right decision for a company, but many organizations must modernize their legacy ERP to stay competitive in their industry. Here's a look at the five "Rs" of modernizing a legacy ERP system and how to decide on the right approach.
Posted: 07 Jun 2022 | Published: 07 Jun 2022


How 5G affects data centres and how to prepare
INFOGRAPHIC: Data centres can prepare for the rise of 5G networking by understanding how it functions, upgrading crucial infrastructure and understanding how 5G networks can benefit them.
Posted: 07 Jun 2022 | Published: 07 Jun 2022


Computer Weekly – 7 June 2022: Using technology to reinvent shopping
EZINE: In this week's Computer Weekly, after the pandemic led to a boom in e-commerce, we look at how retailers are turning to tech to revitalise their stores. We examine the issues around using algorithmic automation to manage employees. And we find out how data science is supporting drug discovery at Novartis. Read the issue now.
Posted: 01 Jun 2022 | Published: 07 Jun 2022


Computer Weekly – 31 May 2022: Trial and error – why the law on computer evidence must change
EZINE: In this week's Computer Weekly, the Post Office IT scandal highlighted the problem with computer evidence – we examine the need for legal reform. We assess the nuclear option for sustainable datacentre power. And we find out how IT experts can improve their soft skills and boost their career prospects as a result. Read the issue now.
Posted: 30 May 2022 | Published: 31 May 2022


CW Europe - June-August 2022: Russia escalates cyber war on Ukraine
EZINE: Microsoft has given details of cyber attacks on Ukrainian civilian communications, nuclear safety authorities, and the exploitation of the destruction of Mariupol in a phishing campaign.
Posted: 27 May 2022 | Published: 09 Jun 2022


A Computer Weekly buyer's guide to communications as a service
EBOOK: As communications needs evolve, organisations must keep pace with the latest services available. In this 15-page buyer's guide, Computer Weekly looks at how we arrived at current-day comms systems, the growing popularity of CPaaS and the advantages of cloud-based offerings in the new normal of hybrid working.
Posted: 27 May 2022 | Published: 27 May 2022


Royal Holloway: Corporate under-reporting of cyber crime
RESEARCH CONTENT: Without reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.
Posted: 26 May 2022 | Published: 26 May 2022


Top DevSecOps certifications for 2022
INFOGRAPHIC: Check out some of the top DevSecOps certifications and trainings that can help professionals learn how to shift security left in the software development lifecycle.
Posted: 25 May 2022 | Published: 25 May 2022


How APAC enterprises can scale up their AI initiatives
EGUIDE: In this e-guide, we take a look into the main trends for AI deployment in APAC, what are the best strategies for enterprises that are looking to scale up their AI initiatives, and how APAC firms are using AI to increase innovation and optimise business processes.
Posted: 25 May 2022 | Published: 25 May 2022


Bad bots make up a quarter of APAC's web traffic
EGUIDE: Bots that run automated tasks have been responsible for stealing personal information among other malicious activities in the Asia-Pacific region, study finds.
Posted: 25 May 2022 | Published: 25 May 2022


Computer Weekly – 24 May 2022: Set innovation free and make great ideas a reality
EZINE: In this week's Computer Weekly, we look at Gartner's call to innovate – and innovation across retail, the circular economy and the automotive sector. We talk to Verastar's CTO about customer engagement in its small business services. And we examine how poor data quality is frustrating corporate desires to be data-driven. Read the issue now.
Posted: 23 May 2022 | Published: 24 May 2022


APAC career guide: Becoming a cyber security pro
EGUIDE: Once the sole domain of highly technical geeks poring over security logs to look for signs of hackers lurking in their networks, cyber security has become more multi-dimensional and varied across specialisations, organisations and industries. In this e-guide, learn what it takes to become a successful cyber security pro in APAC.
Posted: 19 May 2022 | Published: 19 May 2022


RPA vs. BPM: How are they different?
EGUIDE: Robotic process automation and business process management are complementary partners in driving digital transformation initiatives. RPA has received a lot more publicity in recent years, but BPM is an essential discipline and a key enabler in scaling RPA projects. Here are the main differences between these process-oriented initiatives.
Posted: 19 May 2022 | Published: 19 May 2022


Data backup failure: Top 5 causes and tips for prevention Infographic
EBOOK: Backups are central to any data protection strategy, and they are critical to any disaster recovery plan. Unfortunately, backup failure is all too common. When you look at the reasons for failure, the same issues come up again and again. Download this exclusive infographic and find more about how to prevent backup failure.
Posted: 17 May 2022 | Published: 17 May 2022


Computer Weekly – 17 May 2022: Digitally transforming UK power networks for renewable energy
EZINE: In this week's Computer Weekly, we find out how the UK's power networks need to be digital transformed to be ready for renewable energy – and the role of open source. Wi-Fi 6 was meant to give a boost to wireless connectivity – we examine why adoption has stalled. And we look at what a quantum datacentre might be like. Read the issue now.
Posted: 13 May 2022 | Published: 17 May 2022


India 2022 Salary Survey Results
EGUIDE: In this e-guide: We take a look at our 2022 Salary Survey results from over 800 respondents who work in the Indian IT sector. We will be breaking down which job functions get paid what, what areas of IT companies will be investing in 2022 and the current diversity landscape residing in the Indian tech sector.
Posted: 13 May 2022 | Published: 13 May 2022


Royal Holloway: Attack mapping for the internet of things
RESEARCH CONTENT: The introduction of each internet-connected device to a home network increases the risk of cyber attack. This article in our Royal Holloway security series presents a practical model for investigating the security of a home network to evaluate and track what pathways an attacker may use to compromise it.
Posted: 13 May 2022 | Published: 13 May 2022


ASEAN 2022 Salary Survey Results
EGUIDE: In this e-guide: We take a look at our 2022 Salary Survey results from over 300 respondents who work in the ASEAN IT sector. We will be breaking down which job functions get paid what, what areas of IT companies will be investing in 2022 and the current diversity landscape residing in the ASEAN tech sector.
Posted: 13 May 2022 | Published: 13 May 2022