The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.
The results of our 2019 IT Priorities survey are in, and they show the good news that IT budgets are rising faster than they have for many years. Cloud remains the top spending priority for this year, but IT automation is growing fast as a major investment area.
In this infographic, we take a look at the impact of the pandemic on IT purchasing in the UKI region and analyse the best marketing and sales approaches for prospect outreach on the new 'digital' normal.
Tech startups, investors, major suppliers and even leading-edge companies are already placing a bet on the future of quantum computing. In this e-guide, we hear from experts in the tech sector, business consultancies and international corporations as they examine the potential of quantum computing.
ITSM tools are mostly used by IT service desks and IT service delivery functions. In this Magic Quadrant report, the experts at Gartner identify vendors in the ITSM market to help business leaders align their current and future IT roadmaps.
Imperial College London is embarking on a three-year project with an Abu Dhabi-based group of researchers to find ways for datacentre operators and cloud providers to secure their infrastructure. Also read how Dubai is positioning itself to reap the benefits of a promising global market for drone technology.
In this week's Computer Weekly, we talk to Disney Advertising Sales about how it is using data to subserve story-telling excellence. We delve into how rising energy costs negatively impacted the the UK arm of Sungard Availability Services. And we look at the role of infrastructure as code in edge datacentres. Read the issue now.
The Middle East faces fierce competition for IT professionals with the right skills, so it is so worrying that the region's women are so underrepresented in the IT community. In fact over quarter of businesses in the Middle East have no women in their IT departments, according to Computer Weekly's Salary Survey.
According to an academic study in the Netherlands, only one in seven Dutch people report a cyber crime to the police when it happens - feeling it is better to sort the problem out themselves because they don't think the police will do anything.
In this expert guide, Alan Earls, contributor to SearchITOperations.com, walks you through using the Kubernetes configuration for container deployment. Inside, you'll find expert instruction on properly applying Kubernetes' nodes, pods, schedulers, and volumes to bypass orchestration challenges, and more.