Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022
|
|
|
Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER:
The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005
|
|
|
Simplifying Zero Trust for AWS With Okta and Palo Alto Networks
sponsored by AWS Palo Alto Networks
ESG THOUGHT LEADERSHIP EBOOK:
Zero Trust strategies are critical for modern security, but implementation can be complex. This Enterprise Strategy Group e-book explores how Okta and Palo Alto Networks' partnership simplifies Zero Trust on AWS, with identity-centric security and consistent policy enforcement. Learn more by reading the full e-book.
Posted: 14 Aug 2024 | Published: 14 Aug 2024
|
|
|
E-Book: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by Safestone Technologies
EBOOK:
This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 08 Mar 2011 | Published: 08 Mar 2011
|
|
|
eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by TechTarget Security
EBOOK:
This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 12 Mar 2009 | Published: 05 Mar 2009
|
|
|
eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by TechTarget Security
EBOOK:
This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 12 Mar 2009 | Published: 05 Mar 2009
|
|
|
eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by TechTarget Security
EBOOK:
This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 12 Mar 2009 | Published: 05 Mar 2009
|
|
|
Conversational search: the key to new relationships, superior loyalty and sales
sponsored by Elastic and Google Cloud
WHITE PAPER:
Conversational search can help companies engage customers earlier in their journey, build trust, and drive sales. Learn how to implement a successful conversational AI solution that combines public and private data while addressing security and privacy concerns. Read the full white paper.
Posted: 31 Jul 2024 | Published: 01 Aug 2024
|
|
|
Exchange Insider E-Zine - Volume 2: Best and Worst Practices for Email Archiving
sponsored by TechTarget Search Windows Server
EZINE:
Meeting regulatory requirements means that administrators must carve out a sound email-archiving policy; making the wrong move can be costly. In this issue, you'll learn what to do and what not to do when planning your email-archiving strategy.
Posted: 14 Jul 2009 | Published: 14 Jul 2009
|
|
|
Recent BI and Reporting Trends for Oracle EBS
sponsored by Noetix Corporation
EBOOK:
Are you able to effectively leverage and report on Oracle eBusiness Suite data? Read this expert e-book to find out the latest technology trends that may affect your BI and reporting strategy. Learn more about how to get the most out of included BI/reporting features, when to use OBIEE and when you may need to consider alternative tools.
Posted: 31 May 2012 | Published: 31 May 2012
|
|
|
A Computer Weekly buyer's guide to data quality
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The value of data depends on its quality. In this 14-page buyer's guide, Computer Weekly looks at how the coronavirus pandemic has highlighted the challenges of inaccurate datasets, the new analytics techniques improving data quality and Informa's use of Collibra software
Posted: 08 Feb 2021 | Published: 02 Jul 2020
|
|
|
SearchCIO.com eBook: Unlock Outsourcing Potential and Change
sponsored by TechTarget CIO
EBOOK:
The key to unlocking outsourcing potential lies in targeting the right projects, choosing your suppliers wisely and then managing them with an eye on economic conditions at that global site. Here's a step-by-step plan for optimizing savings.
Posted: 04 May 2009 | Published: 04 May 2009
|
|
|
Computer Weekly Buyer's Guide to services for digitisation and IoT
sponsored by TechTarget ComputerWeekly.com
EBOOK:
In this 13-page buyer's guide, Computer Weekly looksat the use of mid-sized nearshore IT service providers, choosing a cloud-based platform, and how to manage the huge volume of IoT data.
Posted: 08 Feb 2021 | Published: 13 Dec 2017
|
|
|
A Computer Weekly buyer's guide to cloud-native architectures
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Cloud-native architectures are seen as the future for businesses. In this 16-page buyer's guide, Computer Weekly looks at the influence of DevOps and microservices-based technology, the continued importance of security in containers for software development and the suitability of Microsoft Azure for deploying cloud-native applications
Posted: 08 Feb 2021 | Published: 20 Nov 2018
|
|
|
CW ANZ: Fix the weak links
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Jul 2018
|
|
|
THE STATE OF DATA ACCESS GOVERNANCE: KEY CHALLENGES AND STRATEGIC BENEFITS
sponsored by SailPoint Technologies
ANALYST REPORT:
Managing access has always been a challenge, but with cloud adoption as well as the advent of remote work, organized data access is more elusive than ever before. Download this report to learn more about the state of data and identity access governance and unlock key findings.
Posted: 30 Nov 2023 | Published: 30 Nov 2023
|
|
|
e-Book: Chapter 4 - ESI Datamap: Managing Litigation Risk
sponsored by Symantec Corporation
BOOK:
This whitepaper explains how an ESI data map serves as a unifying document that ties together information about record locations, litigation hold instructions and retention. Businesses that create an ESI data map their risk of e-discovery noncompliance.
Posted: 01 Jul 2008 | Published: 01 Jul 2008
|
|
|
CW Europe – December 2017
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
Posted: 08 Feb 2021 | Published: 14 Dec 2017
|
|
|
CW ANZ, November 2018: Exploring blockchain
sponsored by TechTarget ComputerWeekly.com
EZINE:
Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.
Posted: 08 Feb 2021 | Published: 07 Nov 2018
|
|
|
CW ASEAN: Trend Watch – Security
sponsored by TechTarget ComputerWeekly.com
EZINE:
Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.
Posted: 08 Feb 2021 | Published: 18 Jul 2019
|
|
|
CW APAC - November 2019: Expert advice on container security
sponsored by TechTarget ComputerWeekly.com
EZINE:
For all the promises of containers, changes in architectureand practices associated with the technology bring newchallenges and opportunities. In this handbook, Computer Weekly looks at the security challenges associated with container technology. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Nov 2019
|
|
|
A Computer Weekly buyer's guide to cyber insurance
sponsored by TechTarget ComputerWeekly.com
EBOOK:
In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.
Posted: 01 Aug 2022 | Published: 01 Aug 2022
|
|
|
The Massachusetts Data Protection Law
sponsored by TechTarget Security
EBOOK:
Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
Posted: 18 Jun 2009 | Published: 18 Jun 2009
|
|
|
Future-proofing the Data Center and Comparing 4 Types of SDS
sponsored by IBM
EGUIDE:
In this eGuide, find out how software defined storage (SDS) will become a key tool in future-proofing an infrastructure. In addition, learn the pros and cons of 4 types of SDS: hypervisor based SDS, hyper-converged infrastructure SDS, storage virtualization SDS and scale-out object and/or file SDS.
Posted: 08 Feb 2021 | Published: 21 Jul 2016
|
|
|
A Computer Weekly buyer's guide to storage for the internet of things
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The internet of things is being used to improve storage options. In this 13-page buyer's guide, Computer Weekly looks at how the IoT could increase volumes of data, the challenges it may bring, and the role edge processing, analytics and the cloud has to play in increasing profits
Posted: 08 Feb 2021 | Published: 10 Dec 2018
|
|