Computer Weekly E-Handbooks
Premium Content

ComputerWeekly E-Handbooks

Featured E-Handbooks

Other E-Handbooks available for free to our members

    • Page 1 of 52
      • The Future of Work

        In this extract from his book, The Future of Work, Jacob Morgan looks at the five key factors shaping the future of work.

        View E-Handbook
      • Getting expense management right

        This analyst paper from Quocirca looks at the benefits that every organisation – whether it is incurring expenses, dealing with the claims process, or processing, reporting or analysing the financial impact on an organisation – should be looking to get from a travel and expenses management system.

        View E-Handbook
      • European HR Realities

        This survey of more than 200 organisations by analyst group Elearnity assesses the HR trends, drivers and challenges facing companies in Europe. It shows the top technology priorities for HR technology are quality analytics, quality HR systems, adopting next generation HR technology, and business systems integration.

        View E-Handbook
      • Managed Print Services in the Cloud

        This report from analyst group Quocirca discusses how extending managed print services (MPS) to the cloud, through standardisation of infrastructure, virtualised server resources and automated processes, will be a major paradigm shift.

        View E-Handbook
      Page 1 of 52
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Big Digital Leadership

        Technology trends such as big data and the Cloud are driving the IT agenda, as are technology-fuelled trends such as mobility and social media. Increased user empowerment as demonstrated by the BYOD movement is changing the CIO’s role from technology manager to digital leader. This report by digital strategist Ade McCormack looks at the strategic impact of these trends and officers CIOs advice on how to turn these trends into business advantage.

        View E-Handbook
      • Computer Weekly Buyer's Guide to smartphones

        Even Microsof t has realised it missed a very important trick not having a mobile operating system that can compete with the likes of the iPhone, Android and Symbian. But how should CIOs and senior IT professionals manage this extension of corporate IT systems to the anytime, anywhere use? This eight-page Buyer’s Guide to Smartphones assesses the market and the latest developments.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Application data security risks on Android devices

        This article in our Royal Holloway Security Series argues that personal and sensitive application data stored on smartphones is not as secure as people think and looks at controls that can reduce the risk.

        View E-Handbook
      • Memory corruption attacks

        Lack of diversity in software and operating systems over many years has left a large number of computers vulnerable to memory program attacks. A diversified and replicated execution system promises to provide effective countermeasures.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Adaptive IT

        The CEB, a member-based advisory company, which represents major IT users, explains adaptive IT – a new model developed from feedback from CIO's worldwide – in this presentation.

        View E-Handbook
      • Special Report on VDI

        The articles contained here were written by Brian Madden, the fiercely independent thought leader in the world of virtualisation and mobility management. Along with his co-author Gabe Knuth, Brian is responsible for both “The VDI Delusion” and “Desktops as a Service” books – considered to be the most reliable sources of information on battling today’s technology pain points.

        View E-Handbook
      • Computer Weekly Buyer's Guide to server virtualisation

        As more businesses seek to virtualise their infrastructure, they will start to experience the limitations of their existing hardware, IT administration tools, procurement and licensing models. This Computer Weekly buyer’s guide to server virtualisation looks at the potential barriers to successful virtualisation and how they can be overcome.

        View E-Handbook
      • Computer Weekly Buyer's Guide to storage and back-up

        In 2011, storage represented an average of 15% of the total IT budget. Making the wrong bets on how you architect your storage environment could cause this number to grow more than your finance chief might like. In this buyer’s guide, we assess the changing storage landscape and identify how the various technologies can be implemented to maximum effect.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 3
      • Inspiring disruption: Tech Trends 2014

        Disruptive technologies provide an opportunity to reshape organisations, change business models and transform industries, according to Deloitte’s Annual Tech Trends Report 2014. This in depth study from Deloitte assesses the top 10 business technology trends in 2014 ranging from the role of the CIO to the impact pf wearable technology.

        View E-Handbook
      • IT Industry Outlook 2014

        CompTIA’s IT Industry Outlook 2014 provides an overview of the size, shape and growth factors of the information technology (IT) industry.

        View E-Handbook
      • Leveraging Talent

        Learn how to make the most of your IT workforce and how to nurture talent by following these strategies used by HR professionals. What kind of leaders will your organisation need tomorrow and how will they differ from the ones it has today? Organizations need good answers to these questions if their talent management strategies are to reap tangible results. Spotting talent is one thing; nurturing it so that it can thrive is another. As workplace demographics shift, there won’t be enough raw skills to go around, so organisations must instead focus on building capability and keeping talent on board. The goal? To ensure that the company’s most valuable asset is supporting and enabling its future growth and success.

        View E-Handbook
      • Managing IT projects for business change. Dealing with trouble.

        No matter how thoroughly you set up and plan a project, unanticipated things may happen. ‘Black swans’, ‘events’, ‘blow-ups’: whatever you call them and whatever their impact, a project manager, backed by the project owner and senior management, has to respond and deal with them. In this extract from their book, Jeff Morgan and Chris Dale draw on real-life examples to offer advice on managing unanticipated events that can disrupt IT projects. They discuss how you find out – early or late – that trouble has come, the tactics you might use to meet problems and the possible consequences for the project.

        View E-Handbook
      • Managing the digital innovation process

        Innovate within a Digital Strategy: managing the digital innovation process – what are the key new strategic challenges for organisations that will be discussed in the boardroom over the next 2 years? Rob Lambert, visiting fellow at Cranfield School of Management, offers advice to CIOs who want to drive digital innovation in this presentation.

        View E-Handbook
      • The Digital Enterprise

        Not every business is a digital business, but every business must become digital. Regardless of industry, company size or business function, the mega trends (mobile, social, cloud and big data) are transforming business processes and technology platforms in fundamental ways. Digital has re-shaped how companies manage security, loyalty, support, public service, supply chain, talent and other critical functions. And digital businesses like Amazon, Salesforce and Twitter are using the four forces to create new markets and topple industry titans. Now it’s time for every business to take full advantage. The extract includes a case study on Coca-Cola Enterprise’s Digital Strategy.

        View E-Handbook
      Page 1 of 3
    • Page 1 of 1
      • Getting expense management right

        This analyst paper from Quocirca looks at the benefits that every organisation – whether it is incurring expenses, dealing with the claims process, or processing, reporting or analysing the financial impact on an organisation – should be looking to get from a travel and expenses management system.

        View E-Handbook
      • WAN Speak Musings – Volume VI

        In this continuing series of articles, Quocirca analysts look at the key issues affecting network design and management. 12 articles address topics including the truthfulness of suppliers, service level agreements and the impact of chief data officers.

        View E-Handbook
      • The Global State of Enterprise Mobility 2014/15

        In this report from the Enterprise Mobility Exchange, specially prepared for Computer Weekly readers, find out where IT professionals are investing around mobile applications, device management and security, and learn about some of the drivers behind the key trends in the enterprise mobile market.

        View E-Handbook
      • How to build an effective User Acceptance Testing (UAT) Team

        The mechanics of team formation are well known, but the User Acceptance Testing (UAT) team has a unique challenge – to acquire the skills it needs, to form an effective team quickly and then to take on a challenging task and complete it in a very short time. This chapter, taken from the book User acceptance testing, a step by step guide, explains how to put together an effective and successful UAT team.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 2
      • CW500: Future gazing to 2014

        Adrian Drury, Consulting Director and Practice Leader at Ovum , highlights some of the key IT trends we can expect to see in 2014. In this presentation, given to Computer Weekly's 500 Club for IT leaders, Adrian Drury talks about the business trends IT leaders need to look out for in 2014.

        View E-Handbook
      • The Open Group - Cloud Computing guide to interoperability and portability

        Cloud computing underpins an important part of economic activity today, and has the potential to make a major contribution to future growth. To deliver its anticipated benefits, it must be easy to use and cost-efficient. This means that enterprises and individuals must be able to use cloud products and services as far as possible “off the shelf”. The products and services should work together, and minimal effort should be needed to incorporate them into a user’s systems. This is the case for the basic Internet, but not yet for the additional components that constitute the cloud. Lack of portability of and interoperability between these components could mean that the potential of cloud computing is not fulfilled. This guide analyses cloud computing portability and interoperability. It makes recommendations to customers on how best to achieve portability and interoperability when working with current cloud products and services. It makes recommendations to suppliers and standards bodies on how standards and best practice should evolve to enable greater portability and interoperability in the future.

        View E-Handbook
      • Negotiating cloud contracts

        This article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated. In particular, we have focused on instances where users have requested changes to providers’ standard terms, and the extent to which providers agreed to those changes. We have found that the terms that generated the most negotiation were provider liability, service level agreements, data protection and security, termination rights, unilateral amendments to service features, and intellectual property rights.

        View E-Handbook
      • Gartner: Best practices for I&O for cloud-readiness

        Cloud computing could end up being a hindrance rather than a help to an enterprise if not planned and implemented properly. In many infrastructure and operations (I&O) teams, it can be observed that previous failures are repeating themselves over and over. Very few organisations are mature enough in terms of people and process capabilities to be able to take cues from past failures and prepare themselves for the foreseeable as well as the unforeseen future.

        View E-Handbook
      • CW Buyers Guide: Green IT

        With IT such a large energy drain for many organisations, firms that cut IT power consumption will reap big benefits. Going green means that computer room air conditioners and chillers are no longer required in the datacentre, potentially slashing energy costs by up to 50% and dramatically lowering the facility’s carbon footprint.

        View E-Handbook
      • The Open Group: Cloud buyers’ decision tree

        This White Paper describes a Decision Tree that could be used to help you discover where Cloud opportunities and solutions might fit in your organization. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises. Your business situation is either a problem or an opportunity for which you are seeking a solution that includes IT enablement. This Tree presupposes that the current and/or future state of the IT resources for your business situation does and/or will not meet requirements. If you are a Cloud seller, then use this Decision Tree in reverse to determine for which business situations your proposed offering would be a good fit.

        View E-Handbook
      Page 1 of 2
    • Page 1 of 1
      • CW Buyer's Guide to Enterprise Collaboration

        In this 10-page buyer's guide, Computer Weekly highlights what the IT leader needs to know to decide on the future of the organisation's communications strategy.

        View E-Handbook
      • Strengthening your business case for using cloud

        With the rapid emergence of technologies, it is important for business executives and stakeholders to focus on the real business challenges and the needs of the enterprise. This White Paper provides a high-level depiction of real-world business problems that were addressed using Cloud computing. By picking the business use-cases that most closely align with your situation, or by analyzing the key requirements of others that have adopted Cloud, you can build a stronger case that justifies the need for using Cloud in your organization.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Computer Weekly Buyer's Guide to mobile device management

        The trend for consumerisation and employees using their own devices for work comes as concerns over data security mount. In this 11-page buyer’s guide, Computer Weekly examines how to formulate a strategic policy for mobile device management (MDM) with a look at how the London Borough of Brent is migrating to a fleet of iPads and iPhones, and how to choose the right MDM approach and product portfolio for your organisation, staff and mobile devices.

        View E-Handbook
      • Computer Weekly Buyer's Guide to tablets

        Predicting the demise of the physical desk has been a bit like predicting the paperless office.

        While great in theory, there are many constraints, often personal and social rather than technical, which makes the reality somewhat more complex to achieve.

        IT departments are coming under increasing pressure from employees demanding more flexibility.

        In this 11-page buyer’s guide, Computer Weekly looks at the use of tablets in business and how the effect of mass adoption of tablets in the enterprise could be far more significant than either the desktop or laptop computer.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • WAN Speak Musings – Volume III

        The network is a dynamic place and the knock-on impact on the rest of IT is more than just a case of occasional lost connectivity or slow response. This report contains 11 short articles that look not just at direct wide area network (WAN)issues, but also at other areas of the ITC platform and the possible impact on an organisation.

        View E-Handbook
      • Calculating Cloud ROI : From the Customer Perspective

        Marketing hype claims that cloud computing can help any enterprise meet most IT service needs at a lower total cost of ownership (TCO) and higher return on investment (ROI). However, the promise of the cloud requiring minimal capital investment and the subjectivity of some cloud benefits have created some confusion among IT professionals trying to determine the benefits of adopting cloud services. Calculating ROI for cloud services requires some up-front work to understand business requirements, organizational, maturity, control considerations and regulatory requirements and to quantify benefits and costs associated with the cloud model that the enterprise has selected. Strategic benefits could be more subjective and may require additional analysis to measure their financial impact over the investment. To determine whether the cloud is a viable option, it is necessary to separate the hype from reality. Calculating ROI does not need to be complex because it is only an estimate to support investment decisions; however, it must be accurate and based on realistic expectations

        View E-Handbook
      • The Cloud Risk Framework

        Companies that are considering moving to a cloud computing model need effective metrics and analytics to help guide their decisions. This cloud framework is designed to help assess the financial risks of moving to the cloud. This paper is aimed at private or public entities with more than 500 employees, and considers risk from their perspective

        View E-Handbook
      • Computer Weekly Buyer's Guide to optimising networks

        This six-page Computer Weekly Buyer's Guide to networking highlights the factors CIOs and senior IT professionals need to consider as they plan strategies for cloud computing and virtualisation networks.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Managed Print Services in the Cloud

        This report from analyst group Quocirca discusses how extending managed print services (MPS) to the cloud, through standardisation of infrastructure, virtualised server resources and automated processes, will be a major paradigm shift.

        View E-Handbook
      • Disrupt IT: A new model for IT in the digital age

        If the IT department were a standalone company then it would be in the throes of a gradual decline from a position of market dominance to being a niche player at best, or disappearing completely. Fortunately for CIOs the IT function has a degree of protection; organisations cannot switch technology overnight – they have too much invested in legacy systems and infrastructure, and issues such as security need to be managed by someone with the right skills and experience. But for newer systems organisations are beginning to look beyond the IT function to cloud-based services that they believe can be procured and used without any involvement from IT.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Business Outcomes from Big Data

        Big data has not yet led to big outcomes. Despite all the hype, less than half of all employees find that corporate information helps them get their jobs done. The problem of getting the right information to the right people at the right time is getting worse with the growing number of information sources, uses, and users. Our previous research discussed how CIOs should help foster informed skepticism to boost the ability of employees to use big data for better decisions. This study discusses the CIO’s role in making big data attainable and useful.

        View E-Handbook
      • Making the case for the cloud in common use airport technology

        This report from Amadeus looks at the business case for cloud computing in airports.

        View E-Handbook
      • Computer Weekly Buyer’s Guide to data management

        In this 11-page buyer’s guide, Computer Weekly looks at the business benefits of data management tools and methods of analysing the stored data, along with some examples of how this data is being used to innovate.

        View E-Handbook
      • Computer Weekly Buyer's Guide to Big Data infrastructure

        In this 10-page buyer’s guide, Computer Weekly looks at the mindset and technology businesses need to analyse various forms of data, the low-cost solid state memory powering datastreams from social network feeds and the industrial internet and a revision of the traditional approach of matching back-end infrastructure to application requirements.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Analytics & Data Warehousing Reader Survey Europe

        Over 150 IT professionals across Europe reveal their plans and priorities for business intelligence and analytics, in this exclusive research from Computer Weekly and TechTarget. This research, conducted in September 2013, reveals Business Intelligence priorities for the next 12 months.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • In demand: the culture of online service provision

        Providing the platforms to support online applications is a must for most organisations. For those pursuing a career in IT and seeking to gain the necessary accreditations, there are higher salaries on offer and an opportunity to be part of the future of IT, say analysts Bob Tarzey and Bernt Østergaard.

        View E-Handbook
      • KPMG Global Technology Innovation Survey

        KPMG’s Global Technology Innovation Survey identifies 3D printing, internet of things (IoT), and biotech/healthcare IT are among the top five disruptive technologies over the next three years.

        View E-Handbook
      • Fair exchange protocols with anonymity and non-repudiation for payments

        The integration of electronic transactions throughout the spectrum of business and our individual daily activities is undeniably widespread. The shift from the standard bricks-and-mortar environment with point of sale (POS) transactions to the virtual, electronic, card-not-present (CNP) environment have expanded the attack surface and created the need for higher security in transactions. This report looks in detail at two key principles necessary for secure payments: fair exchange and non-repudiation for the participants.

        View E-Handbook
      • Computer Weekly Buyer's Guide to IPV6 migration

        The switch from IPv4 to IPv6 began on 6 June 2012, but surprisingly few organisations have done enough to prepare for the transition. The 32-bit IPv4 address space supports 4.3 billion addresses which are rapidly running out – eventually organisations will need to migrate to IPv6. This guide takes you through the steps you need to take and explains the potential impact on your business.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Retail's Digital Future

        This report highlights eight emerging technology trends in retail, some of the pioneering startups making them happen, and the data protection and privacy issues they raise.

        View E-Handbook
      • Gartner: How to build an online community

        Building an online community or following poses one of the biggest challenges for social marketers. This article explains seven ways to lure people to participate and shows you how to choose the tactics that will best suit your needs.

        View E-Handbook
      • Optimising your OmniPayments: Consumers, payments and the future

        Catering to the consumers of today means helping them pay how they want to. Yet with the plethora of options available in the market, it is vital for businesses to find the optimum time to implement new payment options. Developing a wider Omnichannel strategy can help retailers deliver on the overall shopping experience that the consumers of today and tomorrow expect e.g. loyalty, returns and refunds. This report, the culmination of months of research into consumer payment behaviours, has been created to provide a helping hand to anyone looking to take advantage of the new payment technology options at the optimum time for their business.

        View E-Handbook
      • Preparing for the Capital Requirements Directive

        The latest round of regulation from the EU to attempt to create a more stable financial system that can better withstand global economic cycles and upheaval was meant to come into force on January 1st, 2013. The Capital Requirements Directive (CRD), now in its fourth iteration, brings new reporting structures into place. A business-driven language, the eXtensible Business Reporting Language (XBRL) is a mandated part of how financial organisations across the EU will have to submit their prudential reports to the necessary bodies. Just how prepared were the financial markets across Europe for CRD IV and XBRL?

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Open Trusted Technology Provider Standard (O-TTPS)

        The O-TTPS is an open standard containing a set of guidelines that when properly adhered to have been shown to enhance the security of the global supply chain and the integrity of Commercial Off-The-Shelf (COTS) ICT products. It provides a set of guidelines, requirements, and recommendations that help assure against maliciously tainted and counterfeit products throughout the COTS ICT product life cycle encompassing the following phases: design, sourcing, build, fulfillment, distribution, sustainment, and disposal.

        View E-Handbook
      • Special Report on Infosys

        This 6 page special report from Computer Weekly gives you the key facts on Infosys, its strategy, products and services and financial performance.

        View E-Handbook
      • Special Report on Adobe

        This special 7-page report from Computer Weekly, updated for 2014, analyses the challenges facing Adobe, its financial performance, the services and products it offers, its place in the IT market and its future strategy.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • The trust advantage: How to win at big data

        BCG projects that the value created through digital identity could be: €1 trillion in Europe by 2020, or roughly 8% of the combined GDP of the EU-27. For European businesses and governments, the use of personal data will deliver an annual benefit of €330 billion by 2020—bringing growth to an otherwise stagnant economy. An increase in newly available data on consumers will meaningfully shift market shares. But without consumer trust, most of the trillions of dollars of social and economic value promised from big data will go to waste. BCG estimates that two-thirds of the total value potential stands to be lost if companies / organisations fail to establish a trusted flow of personal data This report from Boston Consulting Group, based on surveys of 10,000 people, takes the temperature on how consumers around the world are feeling about the collection and use of personal data. Looking at how this varies by country, generation, and by industry, and also at how significant the gains can be for companies if they successfully build the consumer's trust in gathering and use of data.

        View E-Handbook
      • Privacy and Big Data

        Big data—dubbed “the new oil” by the World Economic Forum—can improve decision making, reduce time to market and increase profits. But it can also raise significant risk, ranging from disastrous data breaches to privacy and compliance concerns. To help enterprises retain control of their massive and fast-changing information, ISACA has issued new guidance/ Privacy and Big Data: An ISACA White Paper outlines critical governance and assurance considerations and lists 26 key questions.

        View E-Handbook
      • The Human Face of Big Data: Data Driven

        On a small scale, the effects of software are benign. But at large companies, institutions, and agencies with hundreds of millions of users, something so apparently small as the choice of what should be a default setting has an immediate impact on the daily behavior patterns of a large percentage of the planet’s population.

        View E-Handbook
      • Governance in IT and Architecture - TOGAF

        The primary audiences for this Paper are business and IT managers who are responsible for the performance of operations. However, enterprise architects also play a key role in supporting IT governance, including architecture governance. Governance is defined as giving direction to activities. In this Paper, the authors focus on governance of the IT domain and its alignment to business. Governance is viewed as a mechanism that influences the internal logic and decision-making of organizations. The internal logic is defined as a compromise between practically conflicting parameters. The mechanism that has to deal with these conflicting parameters consists of decision domains, governance structure, social processes between individuals and groups, and controls to ensure the proper functioning of IT governance. In the context of IT governance, enterprise architecture can be considered as a means for coordination of decision-making related to IT and business. Furthermore, it is recognized that enterprise architecture in its own right also needs to be governed.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Insurance Industry IT: What's costing you dearly?

        The insurance sector is often very conservative, perceived as slow moving, and operates with many long established business practices and processes. However, times move on, new business models emerge, and legacy processes become inefficient. Although IT has played an important role in supporting the industry over many years, it too needs to advance or will become inflexible. Insurance companies might be wasting thousands of sales hours per year from poor processes and badly implemented IT, which increases costs, stifles revenue growth and adds risk. However, IT advances need to go hand-in-hand with business process improvements to ensure that organisations gain the maximimum benefit of being more flexibile, agile and efficient.

        View E-Handbook
      • IT Security Salary Index (UK)

        Are you being paid the right rate for the job ? Check out the going rates for permanent and contract IT security professionals in this salary index from Acumin. The index, based on data collected in November 2013, shows the going rates for IT security professionals. It covers jobs in systems integrators and consultancies, end user organisations, and IT suppliers.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • CIO briefing on agile development

        How do we create agile organisations and behave in a more agile way? What does it take to create a fast-paced, dynamic, innovative and customer centric organisation? Why should we be thinking about agile working at all? Kelly Waters executive Consultant, Coach, and Interim CTO, offers some answers in this presentation geared for CIOs

        View E-Handbook
      • CW Special Report on Cognizant

        This 7 page special report from Computer Weekly gives you the facts on Cognizant, its strategy, products and services and financial performance.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Data Centre Co-location: An easy decision; a difficult choice

        Analysts Clive Longbottom and Bernt Østergaard offer guidelines for those wanting to move to a co-location facility and who want to make sure their selection procedures cover all the criteria required to make the appropriate choice.

        View E-Handbook
      • Beyond Big Data – The New Information Economy

        Organisations are faced with an ever-increasing flow of different data types, including formal, database transactional information as well as less structured documents, voice and video. Within this mix of data types lies the intellectual property of a given organisation – and ensuring that it is in a format that can be easily mined and monetised is an on-going battle. Big data will be part of this, but other issues have to be taken into account. To uncover the true value hidden in the mass of data under the control of a given organisation requires a cohesive and coherent approach to information management. Quocirca believes that this needs a fully integrated system that acts on data streams, rather than taking actions on already stored data, and that there are multiple functions – such as data meta-tagging, deduplication, indexing, search and reporting – to ensure that the intellectual property assets can be optimally discovered and managed.

        View E-Handbook
      • CW Buyer’s Guide: Virtual desktops in the enterprise

        In this Computer Weekly buyer’s guide to virtual desktops, we investigate the latency and bandwidth issues that arise with thin client access, take a look at cloud economics in the datacentre, review Citrix’s XenDesktop 5 desktop virtualisation application, and see how virtualisation and business process optimisation work at the Co-operative

        View E-Handbook
      • Computer Weekly Buyer's Guide to infrastructure on demand

        Working out how to make infrastructure on demand work for your company is a challenge. In this 10-page buyer's guide, Computer Weekly looks at assessing the needs of your business, assess how a lack of standards is hindering progress, and assess Microsoft's Azure which aims to become an operating system for the cloud.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Survey: UK Falling behind France and Germany in Big Data

        The survey from Teradata shows the UK is lagging behind France and Germany in its response to the challenges of handling and analysing big data.

        View E-Handbook
      • Jericho Forum: Data Protection

        This white paper contends that data protection to meet today's and tomorrow's requirements needs to provide stronger, more flexible protection mechanisms around the data itself. It reviews the issues surrounding data protection today, then assesses what properties data protection mechanisms should have to meet current and future requirements, and considers why current technologies don't deliver what is required. It goes on to propose data protection principles for evaluating how adequately any given data protection mechanism performs in meeting key requirements. Having painted this canvas, it looks at the evolution of past measures to protect data, and from that derives a step-by-step path predicting how data protection can be developed to meet the security needs of the future.

        View E-Handbook
      • The next frontier for managed print services

        The managed print services (MPS) market has matured since many organisations inked their first deal. Organisations moving beyond first generation engagements have often reached the end of their cost-cutting phase and are now looking for innovation to drive more business value. MPS is extending beyond the enterprise print environment to address requirements of mobile and remote workers, as well as encompass IT infrastructure and business process outsourcing. By leveraging the synergies of managed print services (MPS), business process services (BPS) and IT services (ITS) through a single provider, enterprises can drive business process innovation that pays continuous dividends.

        View E-Handbook
      • Computer Weekly Buyer's Guide to IT tools

        This Computer Weekly buyer’s guide to IT tools shows how you can use software and systems to improve the running of your IT department.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 3
      • Analytics in a Big Data World

        This extract from Bart Baesen's book gives an overview of big data and analytics, its applications, analytic models, and job profiles in analytics, and includes a discount code for Computer Weekly readers.

        View E-Handbook
      • CW Buyer's Guide to Security Analytics

        Computer Weekly looks at how organisations are gathering intelligence to stay ahead of emerging threats; the importance of gathering data throughout an incident; and the impact of context-aware security.

        View E-Handbook
      Page 1 of 3
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Virtualization Security: Protecting Virtualized Environments

        Hardening the hypervisor should really be viewed as a standard practice, much as it should be for enterprise servers of any importance. There are an incredible number of configuration options for the major platforms (ESXi, Hyper-V, and XenServer). This extract identifies the most fundamental principles, getting you to a sound security state that conforms to industry best practices.

        View E-Handbook
      • BYOD – who carries the can?

        Balancing the costs, risks and benefits of bring your own device (BYOD) There is a trend among employees to want to use their personal choice of mobile device in the fulfilment of their work commitments. While this appears to bring many benefits for the employee to select their preferred device or devices and, on the face of it, reduces upfront costs for their employer, it does introduce significant on-going costs and risks for the organisation. However, with many appealing mobile consumer devices being offered, the trend is likely to increase, so organisations need to work out suitable strategies and policies to manage this complex and hybrid situation in the best interests of both themselves and their employees

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Smartself-service – a guide for buyers

        When looking for a self-service knowledge solution, it can be hard to distinguish between vendors. Most make very similar claims about the capabilities and benefits of their product. To make an informed choice, it is necessary to go beyond marketing rhetoric and assess the specifics of each vendor’s offering. Does the vendor’s feature set support the way in which you envisage implementing self-service? Can the vendor help to deliver an ideal customer experience? Just as important, is the vendor someone with whom you can see yourself happily working?

        View E-Handbook
      • IT Specialist Certification (ITSC) accreditation requirements

        The Open Group IT Specialist Certification Program (the Program) is designed to validate the existence of those qualities and skills in a professional that enable the effective development, implementation, and operation of IT solutions. The Program is skills and experience-based and goes beyond validating the mastery of any specific knowledge base. The Program includes a framework for accreditation of third parties to establish IT Specialist certification programs affiliated to The Open Group. The framework of accreditation and certification is specifically intended to standardize the process and criteria for IT Specialist professional certification and establish a foundation for the required skills and experience necessary to achieve such a distinction. The Program has been designed to be flexible and extensible so that the framework may be adopted by any industry, country, or organization.

        View E-Handbook
      • Computer Weekly's Buyer’s guide to Human Capital Management

        In this 11-page buyer’s guide, Computer Weekly looks at what steps the industry has taken to remedy this shortfall; bridging the gap between the cost savings promised by cloud technologies and the value they deliver; and how to recruit expertise in emerging technologies.

        View E-Handbook
      • Computer Weekly Buyers Guide to IT in Healthcare

        Computer Weekly has compiled this seven-page guide to IT in healthcare, looking at what will happen to electronic healthcare records now the National Programme for IT (NPfIT) has been disbanded, how intelligent tools are being used in the health sector to improve patient care and well-being, and the benefits available to clinicians through the use of mobile technology.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • European HR Realities

        This survey of more than 200 organisations by analyst group Elearnity assesses the HR trends, drivers and challenges facing companies in Europe. It shows the top technology priorities for HR technology are quality analytics, quality HR systems, adopting next generation HR technology, and business systems integration.

        View E-Handbook
      • Transforming business at the intersection of marketing and technology

        What we mean by convergence is the coming together of three irresistible forces—media, technology, and creativity—to meet an immovable object: the enterprise We ’re only at the beginning of understanding these dynamics, but we do know one thing: Businesses have to change themselves quickly and dramatically if they want to survive and thrive. They need to rethink how they communicate with customers, the experiences they create, and how they are set up. The key, as Bob Lord, CEO and Ray Velez, CTO of razorfish, explain this extract from their book, Converge, is to fully recognize the collision that ’s occurred and remake the company to deal with it.

        View E-Handbook
      • Understanding the hard ROI of BYOD

        To the untrained observer, the concept of BYOD is simple: bring in consumer devices and save money. However, this is often based on the incorrect assumption that device costs constitute a significant portion of enterprise mobility spend. In reality, the device cost typically makes up less than 10 percent of a company’s annual mobility spend compared to voice and data, support costs, developer costs, and management software. In return, the challenges of BYOD can increase the other 90 percent of spend to the point where BYOD will actually increase overall costs without providing any tangible benefits.

        View E-Handbook
      • Protecting against modern password cracking

        Attackers are increasingly turning to human psychology and the study of password selection patterns among user groups to develop sophisticated techniques that can quickly and effectively recover passwords. Passwords are commonly protected by applying a one-way cryptographic algorithm that produces a hash of set length given any password as input. However, cryptography can only protect something to the point where the only feasible attack on the encrypted secret is to try to guess it. When it comes to passwords, guessing can be easy.

        View E-Handbook
      • Open Information Security Management Maturity Model (O-ISM3)

        Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps information Security Managers to evaluate their own operating environment and to plan their security management processes so they are consistent with and cost-effective for their organization’s business objectives.

        View E-Handbook
      • The Open Group Architecture Framework (TOGAF™ 9) and the US DoD

        This White Paper provides a comparative analysis of the two frameworks that describes where DoDAF products can be employed throughout the TOGAF ADM phases to develop a visual, integrated model of an architecture. The intended audience is the DoD architect who can benefit from a formal methodology to guide architecture efforts and result in a quality architecture description in a DoD-compliant format, and the TOGAF architect who can benefit by a formal set of defined models to capture output for each of the ADM phases. This document provides the architect with a map of the specific DoDAF 2.0 model that should be produced or consumed in a specific phase of TOGAF 9 with enough context to understand the fundamental concepts of both DoDAF and TOGAF.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Accelerating Digital Marketing

        The hype around digital marketing has led to many reports that CMOs will spend more than CIOs on IT. The implications of this hypothesis come with the same air of confidence: that CIOs are destined to start working for CMOs, or that CIO– CMO conflict is inevitable. These predictions greatly overestimate likely technology spending by CMOs, and more importantly, they are based on a misunderstanding of what CMOs really want. In this study, we debunk these myths and show how CIOs can play a critical role in accelerating digital marketing.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • HR Technology Toolkit

        Leading European & international academic offer insights into HR technology in this in-depth report from HR Zone.

        View E-Handbook
      • Improve the success of HR systems implementation

        HR directors in companies large and small are grappling with selecting and implementing HR systems that need to enhance the business and add long-term value. We pretty much have the HR systems that we asked for and yet most of us agree that our HR systems do not meet our expectations or those of the business. Why? We asked the wrong questions during selection and implementation.

        View E-Handbook
      • ROI Case Study: Salesforce Data.com Tableau Software

        Nucleus Research examined Tableau Software’s use of Salesforce Data.com to help the company quickly identify sales leads across regions and to manage its customer data within a single, centralised solution. Benefits included increased bookings through greater lead generation and increased productivity through more accurate sales data and more precise territory distributions.

        View E-Handbook
      • Sourcing and integrating managed services

        Reliable software applications are as critical for mid-market businesses as they are for enterprises. Choosing the right platform is the key to ensuring that applications are available, scalable, cost effective, compliant and secure. With the growing variety of physical, virtual and cloud-based platforms to choose from for application deployment, many will value the advice of third party experts as they plan the evolution of legacy applications or deploy new ones. This report looks at the issues that mid-market IT and business managers need to take into account when deciding how to deploy applications and when they should consider turning to managed service providers (MSP) for resources and advice. This research should be of interest to those who are focused on delivering their organisation’s core value proposition, whilst also considering how this is best underpinned by IT.

        View E-Handbook
      • Navigating your Future within an SOA information manufacturing system

        As the IT industry reaches maturity, IT departments should think of themselves not as data centres but as manufacturing centres for information. IT is following in the footsteps of the telephone and electricity industry before it, and becoming a commodity. The mission, whether IT knows it or not, is to provide information to its customer when they need it, where they need it, in a form that they can use it, at a price that they are willing to pay. In a nutshell its role, is becoming information manufacturing. It is the business of information manufacturing systems. Data centers are information factories and the IT staff are information builders. This is a profound shift in thinking that will have significant implications for the future of IT department, IT professionals and the business.

        View E-Handbook
      • Computer Weekly Buyer's Guide to software as a service

        In this nine-page buyer’s guide, Computer Weekly looks at how a CIO can best integrate it with existing on-premise software, the restrictions behind such a solution and why consulting expert service providers is a good idea.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Computer weekly Buyer's Guide to green computing

        Driven by rising electricity costs, green legislation and corporate social responsibility, green IT is increasingly on many IT professionals’ minds, particularly for the power-hungry datacentre. In this 11-page buyer’s guide, Computer Weekly looks at some of the technologies that can help your datacentre become cost and energy efficient.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 5
      Page 1 of 5
    • Page 1 of 2
      • Harvey Nash CIO Survey 2014

        More organisations are reporting increases in investment in technology than at any time since 2006 as business confidence returns and companies act fast to play catch up on their digital offering. This is according the 16th annual Harvey Nash CIO Survey, representing the views of more than 3,200 Chief Information Officers (CIOs) and Technology leaders from across more than thirty countries, with a combined technology spend of over $160bn. The Survey is one of the largest and most comprehensive polls of technology leaders in the world. As the global economy begins to recover, organisations are ramping up their investment in digital, mobile and online which has had a further knock on effect in the growing skills shortage, with almost two-thirds of companies reporting that lack of access to the right technology talent is holding back their digital strategy.

        View E-Handbook
      • Strategic IT

        Find out how two leading CIOs have enabled their organisations to use information technology as strategic driver, in this extract from the book Strategic IT. In this extract Dana Deasy, Global CIO of BP and Chris Scalet, Senior Vice President and CIO share their thoughts on the key attributes IT leaders need to make a difference in their organisations.

        View E-Handbook
      • The Secrets of Seamless Retailing Success

        Accenture Research recently conducted a survey that evaluated 15,000 consumers across 20 countries to rank their shopping experiences across channels. The research suggests that consumers may be having second thoughts about the benefits of online shopping. And no one should write off stores just yet. These findings clearly challenge some commonly held assumptions about what consumers want. They also indicate that retailers struggling to provide a seamless, cross-channel customer experience may need to re-think key aspects of their approach

        View E-Handbook
      • European IT Law Briefing: Taking action on misuse of social media by employees

        This briefing from leading European law firms highlights the key legal issues in France, Germany, UK and Italy companies should consider when taking action against employees misuse of social media. The briefing is based on a seminar by the law firms: SKW (Germany), Portolano (Italy), Bersay (France), at the offices of Kemp Little (UK) in London on 30th April 2013.

        View E-Handbook
      • Maximising automation and the industrialisation of IT

        There is a huge amount of human expertise and time being wasted by the majority of IT operations teams. Increased automation is one of the most effective ways to overcome this problem. Only when the tools and services to achieve this are in place can the industrialisation of IT management processes begin. IT operations teams will then have more time to focus on transformation, innovation and deployment of new applications in the interests of the businesses they serve.

        View E-Handbook
      • The Human Face of Big Data: Pulse of the Planet

        After more than 50 years, the Computer Age as we’ve known it is ending. And what will replace it—perhaps we’ll call it the Informatics Age—will be a kind of Copernican Revolution in knowledge. That is, humans will no longer be the center of the data solar system, with all of the billions of devices orbiting around us, but will rather become just another player, another node, in an increasingly autonomous data universe.

        View E-Handbook
      Page 1 of 2
    • Page 1 of 1
      • Accenture Technology Vision 2014

        The Accenture Technology Vision 2014 identifies six technology trends that are enabling large enterprises to push the boundaries of innovation and take advantage of digital technologies for competitive advantage. Leading enterprises are pursuing digital strategies that leverage mobility, analytics, and cloud to improve business processes, take advantage of real-time intelligence, expand the boundaries of traditional workforces, and transform the way data is managed and used.

        View E-Handbook
      • Analytics exploration – today and tomorrow

        Existing analytics approaches meet point needs for specific roles within an organisation. However, how analysis is carried out, and the roles of people who will be carrying out the analysis, will need to adapt dynamically to meet the organisation’s changing needs. The analysis of a blend of multiple different data sources will help to add distinct business value to an organisation. This report will be of interest to those tasked with ensuring that a suitable data management and analysis platform is implemented within their organisation to provide a strategic, flexible, long-term analytics platform.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • The lost opportunity – assessing the impact of OTT services

        In this special report for Computer Weekly readers, Juniper Research looks at the challenges and opportunities facing mobile operator business models.

        View E-Handbook
      • Home Straight to the Top. CIO Leadership in a Mobile, Social, and Cloud-based World Straight to the

        The CIO must have technical knowledge (practical and theoretical) in addition to solid business skills in order to be able to succeed in today’s complex environments and beyond. They need to understand wireless technologies, security, cloud computing, social networking, virtualization, and business intelligence in addition to the “softer” skills like vendor and contract management, communication, financial management, and IT governance. Those experiences—combined with the right academic mix of a bachelor’s degree in computer science, engineering, or information systems and a master’s degree in business—form the killer combination. CIOs with solid technical grounding are better able to rally their IT departments, gain their respect and trust, and appropriately build a successful multiyear strategy that includes a comprehensive and shared discussion with their subordinates, but not one that is dictated by them due to the CIOs’ lack of technical grounding.

        View E-Handbook
      • How to be influential online

        Communicating persuasively may be a tricky art to perfect, but when it’s done properly, the pay-off can be huge, which is why marketing campaigns continue to siphon off huge amounts of corporate money every year. If you want your message to reach and influence your target audience there is one golden rule you must follow: tailor your communication style to the medium you’re using.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 2
      • The Technology Industry Survey 2015

        This is the fourth annual Technology Industry Survey, produced by Computer Weekly and Mortimer Spinks. This year, 3,408 technology professionals shared their views on everything from how cautious they are with their personal data to how they feel about their current employer and what really keeps them happy at work.

        View E-Handbook
      • Executing your strategy 4: Synthesis

        This is the fourth of six part guide which explains the key steps of the Strategic Execution Framework, developed by the Stanford Advanced Management Programme. The Synthesis domain is where plans turn into reality – where companies ensure their planned portfolio of project-based work maps to the actual projects and programs that are being executed. It is the true test of an organization’s commitment to its strategy and ability to execute against it. Any gap between planned and actual reflects a lack of consistency and threatens an organization’s ability to achieve its goals. The Framework is designed to help organizations ensure they stay focused on the initiatives essential to accelerating innovation, increase performance, manage change as well as scale the business.

        View E-Handbook
      • Executing Your Strategy 5: Engagement

        This is the fifth of a six part guide which explains the key steps of the Strategic Execution Framework, developed by the Stanford Advanced Management Programme. The Engagement domain is central to strategic execution. It’s where strategy turns into action by engaging in a portfolio of project-based work that will move the business forward. The ability to choose and fund the right projects and programs is based on clarity around goals, metrics and strategy. Without clarity it’s easy to veer off course and work on projects that aren’t aligned with your objectives and strategies. The Framework is designed to help organizations ensure they stay focused on the initiatives essential to accelerating innovation, increase performance, manage change as well as scale the business.

        View E-Handbook
      • Executing Your Strategy 6: Transition

        This is the final part of a six part guide which explains the key steps of the Strategic Execution Framework, developed by the Stanford Advanced Management Programme. The Transition domain is the ultimate measure of success – moving the results of project-based work into the mainstream of operations. It is where an organization delivers on its goals or not, completing the cycle from strategy through execution. The Framework is designed to help organizations ensure they stay focused on the initiatives essential to accelerating innovation, increase performance, manage change as well as scale the business.

        View E-Handbook
      • How CIOs drive innovation and create value across the enterprise

        Today’s CIO is uniquely positioned to lead innovation and drive transformation across the modern enterprise. That is an indisputable fact. The real question is this: Will CIOs seize the day? Will they leverage their opportunities to become truly transformational leaders? If you are an IT executive, you are uniquely qualified to provide leadership in the modern enterprise. Step up and enjoy your moment in the sun. You deserve it. Hunter Miller explains how CIOs can lead transformation in their organisations in this extract from his book Leading The Epic Revolution. Download includes a 30% discount for Computer Weekly readers

        View E-Handbook
      • Realise Benefits from a Digital Strategy

        Developing the business conversations for IT – how can you convince your business stakeholders to include you? Rob Lambert, visiting fellow at Cranfield School of Management, offers advice to CIOs on developing business cases and maximising the business value of digital technology projects. The presentation covers, tips expressing the organisational value of digital technology, a framework for business stakeholder analysis and benefits realisation, and tips for understanding the implications for IT investment & governance.

        View E-Handbook
      Page 1 of 2
    • Page 1 of 1
      • CW Special Report on Microsoft

        This 12 page special report written by Computer Weekly, and updated for 2012, gives you the facts on Microsoft, its strategy, products and services and financial performance.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Supporting requirements management in TOGAF

        Requirements management is an important activity in the process of designing and managing enterprise architectures. Requirements from various stakeholders form the basis for any change to an organization and its architecture. The quality of these requirements, the extent to which they are realized, and the ease with which they can be changed, determine the quality of any enterprise architecture. Nonetheless, many enterprise architecture modeling techniques focus on what the enterprise should do by representing “as-is” and “to-be” architectures in terms of informational, behavioral, and structural models at the different architectural layers (e.g., business, application, and technical infrastructure). Little or no attention is paid to represent (explicitly) the reasons; i.e., the why, behind the to-be architectures in terms of motivations, rationale, goals, and requirements.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Airport IT Trends Survey

        Airports are spending a larger slice of their revenues on technology as they look to improve the passenger experience and meet the expected demand for air travel. Airport IT spending has grown at a compounded annual growth rate (CAGR) of 12% since 2010 this major study from SITA reveals.

        View E-Handbook
      • Apps Revolution

        Apps are now becoming critical to product and service leadership in just about every industry sector. They represent the future of how enterprises interact with customers, employees, part­ners and machines, as we increasingly access the Inter­net and control our world from the palms of our hands. This report from CSC describes the Apps rEvolution: an evolution in technology that is creating revolutionary business and personal change.

        View E-Handbook
      • How to start, refine and improve your social media business strategy

        Whether it’s Facebook, Twitter or LinkedIn, businesses are now expected to have a social media presence. But if you haven’t made a start or you’re dabbling without a proper strategy, then it’s easy to feel overwhelmed. How does it work? How much of my time will it take? When will I see the benefit? What do I do to get heard? This extract from Adam Gray’s book, Brilliant Social Media will help you get started straightway, then refine and improve your strategy to get real business results. Social media is easy when you know how.

        View E-Handbook
      • Overview Of Near Field Communication

        This chapter from the book NFC Application Development for Android, offers an overview of NFC for Android developers.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Underexposed risks of public Wi-Fi hotspots

        All is not always as it appears when users access public Wi-Fi networks via seemingly authentic and trustworthy providers. This article, in our Royal Holloway Information Security Thesis series seeks to raise awareness of the underexposed risks for identity and data theft by exploring the status quo and potential developments for minimising those risks.

        View E-Handbook
      • Sleeping Android: the danger of dormant permissions

        A weakness in the permissions architecture of the Android platform means that apps could gain access to functionality without a user’s knowledge or consent, leaving them open to exploitation or abuse by attackers. Changes to the way the Android platform authorises permission requests could compromise the security of unwary users.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • The adoption of cloud-based services

        Analysts Bob Tarzey and Bernt Østergaard look at the issues around the adoption of cloud-based services, security technology that is being deployed by enthusiasts and looks at the reasons why the avoiders are holding back.

        View E-Handbook
      • Enabling the secure use of RFID

        UHF radio frequency identification (RFID) promises vastly improved data collection and the analysis of physical objects from consumables to patients. Before its full potential can be exploited, it is critical that security surrounding its use is effectively implemented to ensure the data itself is not exploited

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Mobile Expense Management

        Managing mobile costs is a challenge for all organisations, especially as responsibilities and budget authority often sit in several places—IT, finance, personnel, managers and, of course, the employees themselves. This situation becomes even more complex and problematic for those organisations that span more than one country or have to use multiple suppliers within one country. Getting to grips with these costs in a way that does not undermine the value of mobile flexibility is paramount, and organisations need to gather sufficient detail to effectively manage and analyse their mobile costs. Organisations need to get a grip of mobile spending. Trends such as BYOD might be leading to a reduction in capital expenditure, but there are operational communications, software and security costs and many will be growing. Increased use of mobile to extend and improve business processes should not be inadvertently restrained, but no budgets are limitless.

        View E-Handbook
      • The next wave of digitisation: setting your direction, building your capabilities

        Technology, internet and telecommunications industries are undergoing a fundamental change towards near-complete digitisation, with redefinition of existing business models and value creation systems. This Booz & Company study estimates that by as early as 2015, IT and communications will account for 30-40% of companies' investment budgets, and the ongoing digitisation of every industry will affect global economic value by between $12trn and $15trn in 2020, including market share shifts, cost improve­ments, price decreases and new value pools.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Gartner: Time to rethink backup procedures

        IT leaders and storage managers can realise cost savings and improve their use of backup infrastructure by rethinking their back-up procedures. Cloud services are attractive options for selected workloads, as they alleviate the burden on the data centre backup infrastructure.

        View E-Handbook
      • FM, IT and Data Centres

        Are Facilities and IT data centre managers implacable enemies, or is it just a need for different priorities and emphases on work that seem to get in the way? Often, Quocirca finds that an organisation has one team – facilities management (FM) – looking after the physical facility of the data centre, with another – information technology (IT) – looking after the servers, storage and network equipment, along with the software running within it. This can lead to problems where priorities clash, or where a lack of common language or views of a problem can stop things from happening.

        View E-Handbook
      • Musings on datacentres

        2012 was a year when organisations had to face up to the fact that the basis of IT was beginning to change. Energy costs were rapidly escalating, new technical architectures, such as cloud computing, were coming to the fore and users were off doing their own things. The potential impact on the data centre was massive – and the following report pulls together articles written by Quocirca for SearchVirtualDataCentre (now part of ComputerWeekly) throughout 2012.

        View E-Handbook
      • The Single Unix Specification

        The Single UNIX Specification programming environment provides a broad-based functional set of interfaces to support the porting of existing UNIX applications and the development of new applications. The environment also supports a rich set of tools for application development.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Getting to grips with BYOD

        BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 2
      Page 1 of 2
    • Page 1 of 1
      • Digital identities and the open business

        Identity and access management (IAM) systems are today used by the majority of European enterprises. Many of these are still installed on-premise but increasingly they are being supplemented by the use of on-demand IAM services (IAMaaS). The overall uptake represents a big increase from when Quocirca last surveyed the market in 2009. Whilst IAM is important for managing the access rights of increasingly mobile employees, three other major drivers have encouraged businesses to invest despite the tight economic conditions: the opening up of more and more applications to external users, the growing use of cloud based services and the rise of social media. The ultimate aim with all three is to nurture new business processes, thereby finding and exploiting new opportunities This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. It should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • CW Buyer’s Guide to Apple in the Enterprise

        This nine-page buyers guide assesses the growth of Apple’s computers and iPads in business and the enterprise.

        View E-Handbook
      • How to configure Mac OS X Server

        In the previous article in this series, we showed you how to secure a Mac using the functions built into its operating system, OS X. These functions range from simple password protection and patch management through to full-disk encryption. However, these are not the only security functions available. Indeed, OS X has a whole security and management infrastructure available for administrators called Managed Preferences, which can be managed most easily using OS X Server.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Computer Weekly Buyer's Guide to Windows 8

        Every few years a new Microsoft desktop operating system arrives. In this 11-page buyer’s guide, Computer Weekly looks at how the company’s latest version of Windows could influence corporate IT, taking into consideration the requirement to rewrite existing applications and identifying potential compatibility problems.

        Gain some prior insight into why Microsoft may now be looking to make alterations to the operating system.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • European Channel MPS priorities

        Analysts Louella Fernandes and Clive Longbottom examine MPS adoption amongst resellers in Europe, based on original Quocirca research, and discusses the challenges faced as they embark on their MPS journey.

        View E-Handbook
      • Top 10 Project Management Trends For 2014

        There is growing unease with the status quo of current project management practices, this report from ESI International reveals. Project managers are in increasingly high demand, and are being asked to lead rather than simply manage their teams. Organisations are ‘pulling out all of the stops’ to deal with project complexity, implement new project management approaches, and adopt alternative leadership styles .

        View E-Handbook
      • The identity perimeter

        Successful businesses recognise the value of open communications within and beyond their organisations. However, achieving this means that the physical and virtual perimeters that had previously defined the reach of most organisations’ IT systems have disappeared. This report makes the case for the use of identity and advanced single-sign-on (SSO) to overcome many of the issues of providing open integration between businesses and their customers and partners. It should be of interest to all those in roles charged with the responsibility of providing secure access to online resources and to those who want to make the case for rolling out new online services, but have to overcome the security concerns of others in their organisation before they get the approval to do so.

        View E-Handbook
      • Technology value matrix: Human Resources solutions

        Most small and medium businesses (SMBs) and all large enterprises employ human resources (HR) functionality to manage their employees. Even though many vendors offer HR solutions, these solutions may require integration with other HR software or with enterprise resource planning (ERP) to cover the functionality companies need. Some vendors differentiate themselves from their competitors by providing HR solutions built on new technologies, often times delivered in the cloud, and which can also be accessed on mobile devices.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • The mid-market conundrum

        Most mid market organisations acknowledge that they cannot achieve best-in-class application performance, availability and security, at an affordable cost, based purely on their own resources. To deliver a given application effectively requires the help of an IT service provider (ITSP). The conundrum is finding the right partner with both an applications focus and flexible access to the necessary resources to adapt as workload and technology change. The research presented in this report shows the extent to which UK-based midmarket IT leaders recognise these problems and how effectively they are working with ITSPs to deliver improved services to their business.

        View E-Handbook
      • Nucleus Research ROI Vendor Comparison Scorecard

        This tool provides a single page scorecard for comparing vendors across 14 weighted factors. It generates an overall score for each vendor along with a risk assessment based on the weighting of the factors. (End-user organizations may use this tool to analyse technology decisions but the tool may not be redistributed or modified in any way. Please contact Nucleus Research client services for further information.)

        View E-Handbook
      • CW Special report on Atos

        This 9 page special report, updated for 2014, gives you the facts on Atos, its strategy, products and services and financial performance.

        View E-Handbook
      • CW Special Report on CSC

        The acquisitive IT outsourcer has grown and evolved over the years, but the company is returning to its origins as it undergoes a huge restructuring exercise and moves into cloud services.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • CW Special Report on HP

        This 12 page special report from Computer Weekly, updated for 2013, gives you the facts on HP, its strategy, products and services and financial performance.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1