Premium Content

Access "CW Special Report on CSC"

CWE_prem_CSC_update_220413_FINAL.png

Sponsored by ComputerWeekly.com

The acquisitive IT outsourcer has grown and evolved over the years, but the company is returning to its origins as it undergoes a huge restructuring exercise and moves into cloud services.  Access >>>

Table of contents

  • The growth of outsourcing
  • The Infonet mainframe network
  • Addressing underperforming contracts

 

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • TOGAF® and SABSA® Integration
    TOGAF-and-SABSA-Integration-(1325778738_445).jpg
    E-Handbook

    This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture ...

  • CW+: The Open Group: Cloud buyers’ decision tree
    CW+-The-Open-Group---Cloud-buyers’-decision-tree.jpg
    E-Handbook

    This White Paper describes a Decision Tree that could be used to help you discover where Cloud opportunities and solutions might fit in your ...

  • Open Information Security Management Maturity Model (O-ISM3)
    Open-Information-Security-Management-Maturity-Model-(O-ISM3).jpg
    E-Handbook

    Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps ...