In this week's Computer Weekly, we unveil our list of the 25 most influential women in UK IT, and talk to the winner - Tech City CEO Joanna Shields. We hear from oil giant BP about how it moved to a hybrid cloud environment. And we examine the changing nature of the outsourcing market and what it means for IT managers.
Developed in partnership with Bloomberg Media, this whitepaper shows how next-generation technology can enable CFOs to make smarter, faster decisions with real-time data, deliver stronger business insights, and more.
In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.
This brief resource explores the need for food manufacturers to disclose GMO information before the upcoming Global Data Synchronization Network (GDSN) is introduced, and describes how the right product information management and data aggregation systems can help you get there.
Data, data, data – with the advent of IoT, it's both one of the most promising and one of the most missed out on opportunities in the manufacturing industry today. In this e-guide, we explore the world of industrial IoT (IIoT) and how to leverage its massive data with analytics and machine learning.
This paper looks at trends that cause manufacturers to reevaluate and revamp their B2B processes and integration capabilities. Read on to also learn how manufacturers are reorganizing their internal operations to facilitate the shift from EDI-only transfer to a broader range of functions that support a larger view of commerce.
In 2011, there was a strong willingness to invest in technology by manufacturing organizations. However, that wasn't the only trend. In this tip guide, uncover the most popular developments in 2011 and how these trends have the potential to carry into 2012.
This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.