WHITE PAPER:
This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
EZINE:
In this week's Computer Weekly, we talk to retailer Sainsbury's about its data science strategy and how it helps the firm better understand customers. We take a detailed look at the evolution of the business intelligence market. And we find out how simulated disaster management can tackle the security skills gap. Read the issue now.
PRESENTATION:
In this presentation from our CW500 event, digital transformation programme director Richard Philips explains how the AA tackled the challenges of delivering people, cultural and organisational change.
EBOOK:
In this 14-page buyer's guide, Computer Weekly looks at how the age of the customer requires IT leaders to focus on both the business technology and IT agendas; why IT leaders need to use blogging and social media to raise their profile and build influence in their organisations.
EGUIDE:
In this e-guide, read about how the technology's inherent security makes it tamper-proof, and perfect for keeping and sharing records for transactions in many scenarios. Also, discover why think-tank 'Reform' believes that the government should use blockchain technology for identity assurance services across the public sector.
EZINE:
In this week's Computer Weekly, IT leaders share the lessons learned and discuss best practice in digital transformation. We find out how SAP is addressing customer concerns about its indirect licensing policies. And we assess whether SME IT suppliers are making headway in selling to government CIOs. Read the issue now.
ESSENTIAL GUIDE:
There is a significant opportunity for organisations to gain economic and environmental benefits through operating a more efficient print environment, this report from analyst Quocirca reveals.
WHITE PAPER:
Are you sitting on your data with no plan? Do you know how to capitalize on information you already have? This whitepaper dives into the world of profiting from data. Access now to discover 4 essential steps to getting started, as well as challenges to overcome and a discussion on the importance of data integrity.
EZINE:
BYOD policies: What's allowed and what's banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control.
EGUIDE:
Click into this guide to learn how IoT is shaking up both service management and field services to varying degrees, and learn how you can prepare your digital transformation strategy for an IoT connected future.