EBOOK:
This chapter from Francine Beleyi's book Personal branding in the digital age, explains the seven key pillars you need to build a successful personal brand.
EGUIDE:
Thie e-guide offers a collection of some of our most popular articles on issues faced by IT decision makers, such as how to get cloud implementations right and how and why men in the technology industry have helped women progress.
EZINE:
In this week's Computer Weekly, as millions of people work from home, we examine the measures in place to make sure the internet stays up and running. Our latest buyer's guide looks at the best practice in application modernisation. And we find out how IT leaders are tackling the skills shortage to recruit the best tech talent. Read the issue now.
EGUIDE:
Against all odds, the Australian people and businesses proved their mettle, becoming one of the first countries in the world to emerge from the pandemic. Companies pivoted quickly and adopted new business models while supercharging digitisation initiatives at an unprecedented pace. Here are Computer Weekly's top 10 Australia IT stories of 2020:
EGUIDE:
In this Benelux e-guide we look at how CIOs can succeed in the age of digital transformation. Find out if you have what it takes because the opportunity is massive if you get digital right. There is also some advice for CIOs looking to get more out of their budget so they can fund digital initiatives.
WHITE PAPER:
Over 20% of the mainframe workforce is expected to retire over the next five years. That's why companies are rethinking their hiring strategies with millennials in mind. Check out strategies on how to address this shift in the mainframe talent pool, and learn what your IT and hiring teams should be doing to attract new talent.
EGUIDE:
This e-guide looks at the opinions many industry experts have on how to accelerate the number of women in the technology industry and why doing so is important.
EGUIDE:
2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.
EGUIDE:
In this e-guide, we shine the light on the state of IT service management (ITSM) and the framework upon which it is effectively built, the IT Infrastructure Library (ITIL). We explore how ITSM is being changed by machine learning, how it can be used in the cloud and the datacentre, and the role ITIL could play in digital business transformation.