Computer Weekly E-Handbooks
Premium Content

ComputerWeekly E-Handbooks

Featured E-Handbooks

  • Global Information Security Workforce Study

    There will be an estimated shortall of 1.5 million in the global information security workforce within five years, this study from (ISC)² predicts.

    Download Now

  • Future Trends in UK Banking

    The number of people using mobile and online banking will increase dramatically over the next five years, with major technology implications for banks, this report from the Centre for Economics and Business Research (Cebr) and Fiserv reveals.

    Download Now

Other E-Handbooks available for free to our members

    • Page 1 of 59
      • Talent Management Systems

        This 9-Grid™ report on talent management systems form analyst group Fosway helps buyers understand which systems are best for their requirements, based on performance, presence, total cost of ownership, and future trajectory.

        View E-Handbook
      • No more excuses: VDI is ready!

        There are a lot of reasons to avoid implementing VDI. Access this e-guide with advice from desktop virtualisation expert Brian Madden who directly addresses concerns on storage, graphical experience and non-persistent desktops.

        View E-Handbook
      Page 1 of 59
    • Page 1 of 2
      • Big & Fast Data: The rise of insight-driven business

        This report from Capgemini and EMC, which surveyed more than 1,000 C-suite and senior decision makers around the world, looks at enterprise readiness for big data.

        View E-Handbook
      • Getting expense management right

        This analyst paper from Quocirca looks at the benefits that every organisation – whether it is incurring expenses, dealing with the claims process, or processing, reporting or analysing the financial impact on an organisation – should be looking to get from a travel and expenses management system.

        View E-Handbook
      • WAN Speak Musings – Volume VI

        In this continuing series of articles, Quocirca analysts look at the key issues affecting network design and management. 12 articles address topics including the truthfulness of suppliers, service level agreements and the impact of chief data officers.

        View E-Handbook
      • The Global State of Enterprise Mobility 2014/15

        In this report from the Enterprise Mobility Exchange, specially prepared for Computer Weekly readers, find out where IT professionals are investing around mobile applications, device management and security, and learn about some of the drivers behind the key trends in the enterprise mobile market.

        View E-Handbook
      • How to build an effective User Acceptance Testing (UAT) Team

        The mechanics of team formation are well known, but the User Acceptance Testing (UAT) team has a unique challenge – to acquire the skills it needs, to form an effective team quickly and then to take on a challenging task and complete it in a very short time. This chapter, taken from the book User acceptance testing, a step by step guide, explains how to put together an effective and successful UAT team.

        View E-Handbook
      • CW Special Report on Wipro

        This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance.

        View E-Handbook
      Page 1 of 2
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • CW Buyer's Guide to Enterprise Collaboration

        In this 10-page buyer's guide, Computer Weekly highlights what the IT leader needs to know to decide on the future of the organisation's communications strategy.

        View E-Handbook
      • Strengthening your business case for using cloud

        With the rapid emergence of technologies, it is important for business executives and stakeholders to focus on the real business challenges and the needs of the enterprise. This White Paper provides a high-level depiction of real-world business problems that were addressed using Cloud computing. By picking the business use-cases that most closely align with your situation, or by analyzing the key requirements of others that have adopted Cloud, you can build a stronger case that justifies the need for using Cloud in your organization.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Business Outcomes from Big Data

        Big data has not yet led to big outcomes. Despite all the hype, less than half of all employees find that corporate information helps them get their jobs done. The problem of getting the right information to the right people at the right time is getting worse with the growing number of information sources, uses, and users. Our previous research discussed how CIOs should help foster informed skepticism to boost the ability of employees to use big data for better decisions. This study discusses the CIO’s role in making big data attainable and useful.

        View E-Handbook
      • Making the case for the cloud in common use airport technology

        This report from Amadeus looks at the business case for cloud computing in airports.

        View E-Handbook
      • Computer Weekly Buyer’s Guide to data management

        In this 11-page buyer’s guide, Computer Weekly looks at the business benefits of data management tools and methods of analysing the stored data, along with some examples of how this data is being used to innovate.

        View E-Handbook
      • Computer Weekly Buyer's Guide to Big Data infrastructure

        In this 10-page buyer’s guide, Computer Weekly looks at the mindset and technology businesses need to analyse various forms of data, the low-cost solid state memory powering datastreams from social network feeds and the industrial internet and a revision of the traditional approach of matching back-end infrastructure to application requirements.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Analytics & Data Warehousing Reader Survey Europe

        Over 150 IT professionals across Europe reveal their plans and priorities for business intelligence and analytics, in this exclusive research from Computer Weekly and TechTarget. This research, conducted in September 2013, reveals Business Intelligence priorities for the next 12 months.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • In demand: the culture of online service provision

        Providing the platforms to support online applications is a must for most organisations. For those pursuing a career in IT and seeking to gain the necessary accreditations, there are higher salaries on offer and an opportunity to be part of the future of IT, say analysts Bob Tarzey and Bernt Østergaard.

        View E-Handbook
      • KPMG Global Technology Innovation Survey

        KPMG’s Global Technology Innovation Survey identifies 3D printing, internet of things (IoT), and biotech/healthcare IT are among the top five disruptive technologies over the next three years.

        View E-Handbook
      • Fair exchange protocols with anonymity and non-repudiation for payments

        The integration of electronic transactions throughout the spectrum of business and our individual daily activities is undeniably widespread. The shift from the standard bricks-and-mortar environment with point of sale (POS) transactions to the virtual, electronic, card-not-present (CNP) environment have expanded the attack surface and created the need for higher security in transactions. This report looks in detail at two key principles necessary for secure payments: fair exchange and non-repudiation for the participants.

        View E-Handbook
      • Computer Weekly Buyer's Guide to IPV6 migration

        The switch from IPv4 to IPv6 began on 6 June 2012, but surprisingly few organisations have done enough to prepare for the transition. The 32-bit IPv4 address space supports 4.3 billion addresses which are rapidly running out – eventually organisations will need to migrate to IPv6. This guide takes you through the steps you need to take and explains the potential impact on your business.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Future Trends in UK Banking

        The number of people using mobile and online banking will increase dramatically over the next five years, with major technology implications for banks, this report from the Centre for Economics and Business Research (Cebr) and Fiserv reveals.

        View E-Handbook
      • Retail's Digital Future

        This report highlights eight emerging technology trends in retail, some of the pioneering startups making them happen, and the data protection and privacy issues they raise.

        View E-Handbook
      • Gartner: How to build an online community

        Building an online community or following poses one of the biggest challenges for social marketers. This article explains seven ways to lure people to participate and shows you how to choose the tactics that will best suit your needs.

        View E-Handbook
      • Optimising your OmniPayments: Consumers, payments and the future

        Catering to the consumers of today means helping them pay how they want to. Yet with the plethora of options available in the market, it is vital for businesses to find the optimum time to implement new payment options. Developing a wider Omnichannel strategy can help retailers deliver on the overall shopping experience that the consumers of today and tomorrow expect e.g. loyalty, returns and refunds. This report, the culmination of months of research into consumer payment behaviours, has been created to provide a helping hand to anyone looking to take advantage of the new payment technology options at the optimum time for their business.

        View E-Handbook
      • Preparing for the Capital Requirements Directive

        The latest round of regulation from the EU to attempt to create a more stable financial system that can better withstand global economic cycles and upheaval was meant to come into force on January 1st, 2013. The Capital Requirements Directive (CRD), now in its fourth iteration, brings new reporting structures into place. A business-driven language, the eXtensible Business Reporting Language (XBRL) is a mandated part of how financial organisations across the EU will have to submit their prudential reports to the necessary bodies. Just how prepared were the financial markets across Europe for CRD IV and XBRL?

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Open Trusted Technology Provider Standard (O-TTPS)

        The O-TTPS is an open standard containing a set of guidelines that when properly adhered to have been shown to enhance the security of the global supply chain and the integrity of Commercial Off-The-Shelf (COTS) ICT products. It provides a set of guidelines, requirements, and recommendations that help assure against maliciously tainted and counterfeit products throughout the COTS ICT product life cycle encompassing the following phases: design, sourcing, build, fulfillment, distribution, sustainment, and disposal.

        View E-Handbook
      • Special Report on Infosys

        This 6 page special report from Computer Weekly gives you the key facts on Infosys, its strategy, products and services and financial performance.

        View E-Handbook
      • Special Report on Adobe

        This special 7-page report from Computer Weekly, updated for 2014, analyses the challenges facing Adobe, its financial performance, the services and products it offers, its place in the IT market and its future strategy.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • The trust advantage: How to win at big data

        BCG projects that the value created through digital identity could be: €1 trillion in Europe by 2020, or roughly 8% of the combined GDP of the EU-27. For European businesses and governments, the use of personal data will deliver an annual benefit of €330 billion by 2020—bringing growth to an otherwise stagnant economy. An increase in newly available data on consumers will meaningfully shift market shares. But without consumer trust, most of the trillions of dollars of social and economic value promised from big data will go to waste. BCG estimates that two-thirds of the total value potential stands to be lost if companies / organisations fail to establish a trusted flow of personal data This report from Boston Consulting Group, based on surveys of 10,000 people, takes the temperature on how consumers around the world are feeling about the collection and use of personal data. Looking at how this varies by country, generation, and by industry, and also at how significant the gains can be for companies if they successfully build the consumer's trust in gathering and use of data.

        View E-Handbook
      • Privacy and Big Data

        Big data—dubbed “the new oil” by the World Economic Forum—can improve decision making, reduce time to market and increase profits. But it can also raise significant risk, ranging from disastrous data breaches to privacy and compliance concerns. To help enterprises retain control of their massive and fast-changing information, ISACA has issued new guidance/ Privacy and Big Data: An ISACA White Paper outlines critical governance and assurance considerations and lists 26 key questions.

        View E-Handbook
      • The Human Face of Big Data: Data Driven

        On a small scale, the effects of software are benign. But at large companies, institutions, and agencies with hundreds of millions of users, something so apparently small as the choice of what should be a default setting has an immediate impact on the daily behavior patterns of a large percentage of the planet’s population.

        View E-Handbook
      • Governance in IT and Architecture - TOGAF

        The primary audiences for this Paper are business and IT managers who are responsible for the performance of operations. However, enterprise architects also play a key role in supporting IT governance, including architecture governance. Governance is defined as giving direction to activities. In this Paper, the authors focus on governance of the IT domain and its alignment to business. Governance is viewed as a mechanism that influences the internal logic and decision-making of organizations. The internal logic is defined as a compromise between practically conflicting parameters. The mechanism that has to deal with these conflicting parameters consists of decision domains, governance structure, social processes between individuals and groups, and controls to ensure the proper functioning of IT governance. In the context of IT governance, enterprise architecture can be considered as a means for coordination of decision-making related to IT and business. Furthermore, it is recognized that enterprise architecture in its own right also needs to be governed.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • UK tech sector outperformed wider UK economy in Q4 2014

        The UK tech sector enjoyed robust growth in the last quarter of 2014, avoiding the slowdown seen across the wider UK economy, according to this analysis by KPMG/Markit Tech Monitor.

        View E-Handbook
      • Insurance Industry IT: What's costing you dearly?

        The insurance sector is often very conservative, perceived as slow moving, and operates with many long established business practices and processes. However, times move on, new business models emerge, and legacy processes become inefficient. Although IT has played an important role in supporting the industry over many years, it too needs to advance or will become inflexible. Insurance companies might be wasting thousands of sales hours per year from poor processes and badly implemented IT, which increases costs, stifles revenue growth and adds risk. However, IT advances need to go hand-in-hand with business process improvements to ensure that organisations gain the maximimum benefit of being more flexibile, agile and efficient.

        View E-Handbook
      • IT Security Salary Index (UK)

        Are you being paid the right rate for the job ? Check out the going rates for permanent and contract IT security professionals in this salary index from Acumin. The index, based on data collected in November 2013, shows the going rates for IT security professionals. It covers jobs in systems integrators and consultancies, end user organisations, and IT suppliers.

        View E-Handbook
      • CW Special Report on TCS

        This 5 page special report gives you the facts on TCS, its strategy, products and services and financial performance.

        View E-Handbook
      • Computer Weekly Buyer's Guide to client computing

        In this 10-page buyer’s guide, Computer Weekly looks at Windows 8 and the complexities of mobile working, the benefits to the business of an enhanced user experience and the shift from the 9-to-5 office desk to IT delivered over a variety of devices, anytime, anywhere.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Data Centre Co-location: An easy decision; a difficult choice

        Analysts Clive Longbottom and Bernt Østergaard offer guidelines for those wanting to move to a co-location facility and who want to make sure their selection procedures cover all the criteria required to make the appropriate choice.

        View E-Handbook
      • Beyond Big Data – The New Information Economy

        Organisations are faced with an ever-increasing flow of different data types, including formal, database transactional information as well as less structured documents, voice and video. Within this mix of data types lies the intellectual property of a given organisation – and ensuring that it is in a format that can be easily mined and monetised is an on-going battle. Big data will be part of this, but other issues have to be taken into account. To uncover the true value hidden in the mass of data under the control of a given organisation requires a cohesive and coherent approach to information management. Quocirca believes that this needs a fully integrated system that acts on data streams, rather than taking actions on already stored data, and that there are multiple functions – such as data meta-tagging, deduplication, indexing, search and reporting – to ensure that the intellectual property assets can be optimally discovered and managed.

        View E-Handbook
      • CW Buyer’s Guide: Virtual desktops in the enterprise

        In this Computer Weekly buyer’s guide to virtual desktops, we investigate the latency and bandwidth issues that arise with thin client access, take a look at cloud economics in the datacentre, review Citrix’s XenDesktop 5 desktop virtualisation application, and see how virtualisation and business process optimisation work at the Co-operative

        View E-Handbook
      • Computer Weekly Buyer's Guide to infrastructure on demand

        Working out how to make infrastructure on demand work for your company is a challenge. In this 10-page buyer's guide, Computer Weekly looks at assessing the needs of your business, assess how a lack of standards is hindering progress, and assess Microsoft's Azure which aims to become an operating system for the cloud.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • The major recruitment, skills and career development issues facing today's IT leaders

        La Fosse Associates executive search consultant Chris Chandler presents the key recruitment, skills and career development issues facing IT leaders in 2015.

        View E-Handbook
      • Smartself-service – a guide for buyers

        When looking for a self-service knowledge solution, it can be hard to distinguish between vendors. Most make very similar claims about the capabilities and benefits of their product. To make an informed choice, it is necessary to go beyond marketing rhetoric and assess the specifics of each vendor’s offering. Does the vendor’s feature set support the way in which you envisage implementing self-service? Can the vendor help to deliver an ideal customer experience? Just as important, is the vendor someone with whom you can see yourself happily working?

        View E-Handbook
      • IT Specialist Certification (ITSC) accreditation requirements

        The Open Group IT Specialist Certification Program (the Program) is designed to validate the existence of those qualities and skills in a professional that enable the effective development, implementation, and operation of IT solutions. The Program is skills and experience-based and goes beyond validating the mastery of any specific knowledge base. The Program includes a framework for accreditation of third parties to establish IT Specialist certification programs affiliated to The Open Group. The framework of accreditation and certification is specifically intended to standardize the process and criteria for IT Specialist professional certification and establish a foundation for the required skills and experience necessary to achieve such a distinction. The Program has been designed to be flexible and extensible so that the framework may be adopted by any industry, country, or organization.

        View E-Handbook
      • Computer Weekly's Buyer’s guide to Human Capital Management

        In this 11-page buyer’s guide, Computer Weekly looks at what steps the industry has taken to remedy this shortfall; bridging the gap between the cost savings promised by cloud technologies and the value they deliver; and how to recruit expertise in emerging technologies.

        View E-Handbook
      • Computer Weekly Buyers Guide to IT in Healthcare

        Computer Weekly has compiled this seven-page guide to IT in healthcare, looking at what will happen to electronic healthcare records now the National Programme for IT (NPfIT) has been disbanded, how intelligent tools are being used in the health sector to improve patient care and well-being, and the benefits available to clinicians through the use of mobile technology.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • CIO briefing on agile development

        How do we create agile organisations and behave in a more agile way? What does it take to create a fast-paced, dynamic, innovative and customer centric organisation? Why should we be thinking about agile working at all? Kelly Waters executive Consultant, Coach, and Interim CTO, offers some answers in this presentation geared for CIOs

        View E-Handbook
      • CW Special Report on Cognizant

        This 7 page special report from Computer Weekly gives you the facts on Cognizant, its strategy, products and services and financial performance.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Accelerating Digital Marketing

        The hype around digital marketing has led to many reports that CMOs will spend more than CIOs on IT. The implications of this hypothesis come with the same air of confidence: that CIOs are destined to start working for CMOs, or that CIO– CMO conflict is inevitable. These predictions greatly overestimate likely technology spending by CMOs, and more importantly, they are based on a misunderstanding of what CMOs really want. In this study, we debunk these myths and show how CIOs can play a critical role in accelerating digital marketing.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • CW Special Report on Symantec

        Packed with graphs and diagrams and tables, this independent analysis by Computer Weekly is essential reading for any organisation working with, or thinking of working with Symantec.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 6
      Page 1 of 6
    • Page 1 of 1
      • Accenture Technology Vision 2014

        The Accenture Technology Vision 2014 identifies six technology trends that are enabling large enterprises to push the boundaries of innovation and take advantage of digital technologies for competitive advantage. Leading enterprises are pursuing digital strategies that leverage mobility, analytics, and cloud to improve business processes, take advantage of real-time intelligence, expand the boundaries of traditional workforces, and transform the way data is managed and used.

        View E-Handbook
      • Analytics exploration – today and tomorrow

        Existing analytics approaches meet point needs for specific roles within an organisation. However, how analysis is carried out, and the roles of people who will be carrying out the analysis, will need to adapt dynamically to meet the organisation’s changing needs. The analysis of a blend of multiple different data sources will help to add distinct business value to an organisation. This report will be of interest to those tasked with ensuring that a suitable data management and analysis platform is implemented within their organisation to provide a strategic, flexible, long-term analytics platform.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 2
      • The Technology Industry Survey 2015

        This is the fourth annual Technology Industry Survey, produced by Computer Weekly and Mortimer Spinks. This year, 3,408 technology professionals shared their views on everything from how cautious they are with their personal data to how they feel about their current employer and what really keeps them happy at work.

        View E-Handbook
      • Executing your strategy 4: Synthesis

        This is the fourth of six part guide which explains the key steps of the Strategic Execution Framework, developed by the Stanford Advanced Management Programme. The Synthesis domain is where plans turn into reality – where companies ensure their planned portfolio of project-based work maps to the actual projects and programs that are being executed. It is the true test of an organization’s commitment to its strategy and ability to execute against it. Any gap between planned and actual reflects a lack of consistency and threatens an organization’s ability to achieve its goals. The Framework is designed to help organizations ensure they stay focused on the initiatives essential to accelerating innovation, increase performance, manage change as well as scale the business.

        View E-Handbook
      • Executing Your Strategy 5: Engagement

        This is the fifth of a six part guide which explains the key steps of the Strategic Execution Framework, developed by the Stanford Advanced Management Programme. The Engagement domain is central to strategic execution. It’s where strategy turns into action by engaging in a portfolio of project-based work that will move the business forward. The ability to choose and fund the right projects and programs is based on clarity around goals, metrics and strategy. Without clarity it’s easy to veer off course and work on projects that aren’t aligned with your objectives and strategies. The Framework is designed to help organizations ensure they stay focused on the initiatives essential to accelerating innovation, increase performance, manage change as well as scale the business.

        View E-Handbook
      • Executing Your Strategy 6: Transition

        This is the final part of a six part guide which explains the key steps of the Strategic Execution Framework, developed by the Stanford Advanced Management Programme. The Transition domain is the ultimate measure of success – moving the results of project-based work into the mainstream of operations. It is where an organization delivers on its goals or not, completing the cycle from strategy through execution. The Framework is designed to help organizations ensure they stay focused on the initiatives essential to accelerating innovation, increase performance, manage change as well as scale the business.

        View E-Handbook
      • How CIOs drive innovation and create value across the enterprise

        Today’s CIO is uniquely positioned to lead innovation and drive transformation across the modern enterprise. That is an indisputable fact. The real question is this: Will CIOs seize the day? Will they leverage their opportunities to become truly transformational leaders? If you are an IT executive, you are uniquely qualified to provide leadership in the modern enterprise. Step up and enjoy your moment in the sun. You deserve it. Hunter Miller explains how CIOs can lead transformation in their organisations in this extract from his book Leading The Epic Revolution. Download includes a 30% discount for Computer Weekly readers

        View E-Handbook
      • Realise Benefits from a Digital Strategy

        Developing the business conversations for IT – how can you convince your business stakeholders to include you? Rob Lambert, visiting fellow at Cranfield School of Management, offers advice to CIOs on developing business cases and maximising the business value of digital technology projects. The presentation covers, tips expressing the organisational value of digital technology, a framework for business stakeholder analysis and benefits realisation, and tips for understanding the implications for IT investment & governance.

        View E-Handbook
      Page 1 of 2
    • Page 1 of 1
      • CW Special Report on Microsoft

        This 12 page special report written by Computer Weekly, and updated for 2012, gives you the facts on Microsoft, its strategy, products and services and financial performance.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Underexposed risks of public Wi-Fi hotspots

        All is not always as it appears when users access public Wi-Fi networks via seemingly authentic and trustworthy providers. This article, in our Royal Holloway Information Security Thesis series seeks to raise awareness of the underexposed risks for identity and data theft by exploring the status quo and potential developments for minimising those risks.

        View E-Handbook
      • Sleeping Android: the danger of dormant permissions

        A weakness in the permissions architecture of the Android platform means that apps could gain access to functionality without a user’s knowledge or consent, leaving them open to exploitation or abuse by attackers. Changes to the way the Android platform authorises permission requests could compromise the security of unwary users.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Mobile Expense Management

        Managing mobile costs is a challenge for all organisations, especially as responsibilities and budget authority often sit in several places—IT, finance, personnel, managers and, of course, the employees themselves. This situation becomes even more complex and problematic for those organisations that span more than one country or have to use multiple suppliers within one country. Getting to grips with these costs in a way that does not undermine the value of mobile flexibility is paramount, and organisations need to gather sufficient detail to effectively manage and analyse their mobile costs. Organisations need to get a grip of mobile spending. Trends such as BYOD might be leading to a reduction in capital expenditure, but there are operational communications, software and security costs and many will be growing. Increased use of mobile to extend and improve business processes should not be inadvertently restrained, but no budgets are limitless.

        View E-Handbook
      • The next wave of digitisation: setting your direction, building your capabilities

        Technology, internet and telecommunications industries are undergoing a fundamental change towards near-complete digitisation, with redefinition of existing business models and value creation systems. This Booz & Company study estimates that by as early as 2015, IT and communications will account for 30-40% of companies' investment budgets, and the ongoing digitisation of every industry will affect global economic value by between $12trn and $15trn in 2020, including market share shifts, cost improve­ments, price decreases and new value pools.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Gartner: Time to rethink backup procedures

        IT leaders and storage managers can realise cost savings and improve their use of backup infrastructure by rethinking their back-up procedures. Cloud services are attractive options for selected workloads, as they alleviate the burden on the data centre backup infrastructure.

        View E-Handbook
      • FM, IT and Data Centres

        Are Facilities and IT data centre managers implacable enemies, or is it just a need for different priorities and emphases on work that seem to get in the way? Often, Quocirca finds that an organisation has one team – facilities management (FM) – looking after the physical facility of the data centre, with another – information technology (IT) – looking after the servers, storage and network equipment, along with the software running within it. This can lead to problems where priorities clash, or where a lack of common language or views of a problem can stop things from happening.

        View E-Handbook
      • Musings on datacentres

        2012 was a year when organisations had to face up to the fact that the basis of IT was beginning to change. Energy costs were rapidly escalating, new technical architectures, such as cloud computing, were coming to the fore and users were off doing their own things. The potential impact on the data centre was massive – and the following report pulls together articles written by Quocirca for SearchVirtualDataCentre (now part of ComputerWeekly) throughout 2012.

        View E-Handbook
      • The Single Unix Specification

        The Single UNIX Specification programming environment provides a broad-based functional set of interfaces to support the porting of existing UNIX applications and the development of new applications. The environment also supports a rich set of tools for application development.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Getting to grips with BYOD

        BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 2
      Page 1 of 2
    • Page 1 of 1
      • Digital identities and the open business

        Identity and access management (IAM) systems are today used by the majority of European enterprises. Many of these are still installed on-premise but increasingly they are being supplemented by the use of on-demand IAM services (IAMaaS). The overall uptake represents a big increase from when Quocirca last surveyed the market in 2009. Whilst IAM is important for managing the access rights of increasingly mobile employees, three other major drivers have encouraged businesses to invest despite the tight economic conditions: the opening up of more and more applications to external users, the growing use of cloud based services and the rise of social media. The ultimate aim with all three is to nurture new business processes, thereby finding and exploiting new opportunities This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. It should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • CW Buyer’s Guide to Apple in the Enterprise

        This nine-page buyers guide assesses the growth of Apple’s computers and iPads in business and the enterprise.

        View E-Handbook
      • How to configure Mac OS X Server

        In the previous article in this series, we showed you how to secure a Mac using the functions built into its operating system, OS X. These functions range from simple password protection and patch management through to full-disk encryption. However, these are not the only security functions available. Indeed, OS X has a whole security and management infrastructure available for administrators called Managed Preferences, which can be managed most easily using OS X Server.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • A Computer Weekly buyer's guide to desktop computing 2020

        Tablets, smartphones, cloud computing and applications delivered as a service offer compelling new ways to work. In this 11-page buyer's guide, Computer Weekly looks at how this way of working is likely to evolve further over the next five years and how it will affect users and IT departments alike.

        View E-Handbook
      • Computer Weekly Buyer's Guide to Windows 8

        Every few years a new Microsoft desktop operating system arrives. In this 11-page buyer’s guide, Computer Weekly looks at how the company’s latest version of Windows could influence corporate IT, taking into consideration the requirement to rewrite existing applications and identifying potential compatibility problems.

        Gain some prior insight into why Microsoft may now be looking to make alterations to the operating system.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • The mid-market conundrum

        Most mid market organisations acknowledge that they cannot achieve best-in-class application performance, availability and security, at an affordable cost, based purely on their own resources. To deliver a given application effectively requires the help of an IT service provider (ITSP). The conundrum is finding the right partner with both an applications focus and flexible access to the necessary resources to adapt as workload and technology change. The research presented in this report shows the extent to which UK-based midmarket IT leaders recognise these problems and how effectively they are working with ITSPs to deliver improved services to their business.

        View E-Handbook
      • Nucleus Research ROI Vendor Comparison Scorecard

        This tool provides a single page scorecard for comparing vendors across 14 weighted factors. It generates an overall score for each vendor along with a risk assessment based on the weighting of the factors. (End-user organizations may use this tool to analyse technology decisions but the tool may not be redistributed or modified in any way. Please contact Nucleus Research client services for further information.)

        View E-Handbook
      • CW Special report on Atos

        This 9 page special report, updated for 2014, gives you the facts on Atos, its strategy, products and services and financial performance.

        View E-Handbook
      • CW Special Report on CSC

        The acquisitive IT outsourcer has grown and evolved over the years, but the company is returning to its origins as it undergoes a huge restructuring exercise and moves into cloud services.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • CW Special Report on HP

        This 12 page special report from Computer Weekly, updated for 2013, gives you the facts on HP, its strategy, products and services and financial performance.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Analytics across the ecosystem

        Analytics is a key enabler for life sciences and healthcare organizations to create better outcomes for patients, customers and other stakeholders across the entire healthcare ecosystem. While almost two-thirds of organizations across the healthcare ecosystem have analytics strategies in place, this research from IBM shows that only a fifth are driving analytics adoption across the enterprise. The key barriers are a lack of data management capabilities and skilled analysts, as well as poor organizational change management. To develop and translate insights into actions that enhance outcomes, organizations will need to collaborate across an expanding ecosystem.

        View E-Handbook
      • CIO Thought Leadership: The Sum of all brands

        The convergence of market volatility, the empowered worker, globalization and accelerating technological developments is making it harder than ever for organisations to maintain a sustainable advantage. Gone are the days when businesses created a unique selling proposition and lived off it for years on end. Today, at best one can only hope for a temporary advantage. Today reinvention feels more like a daily habit than a major event. Customers are in the driving seat and, as such will simply migrate to where they are best served. Acquiring new customers is very expensive so organisational survival is dependent on the organisation’s ability to retain its customers. Consequently customer-centricity must lie at the heart of the organisation’s strategy. This has significant implications on every aspect of the organisation’s operations.

        View E-Handbook
      • Code Halos – How the digital lives of People, Things, and Organisations are Changing

        Code Halo refers to the data that accumulates around people, devices, and organizations—data that’s robust, powerful, and continually growing in richness and complexity. The halos contain the code that companies, brands, employers, and partners can use to enhance their understanding of people or objects more deeply. Decoding the information within that invisible field, teasing out the insights, and creating new commercial models does not happen automatically or easily. But every employee, product, building, and organization should have a Code Halo, and this book is going to explain how and why. While technology makes Code Halos possible, they transcend constructs like IT or Big Data or analytics. Code Halos make meaningful connections between people, organizations, and devices in a business context. Extracting meaning from Code Halos—and applying that understanding to business strategies and practices—is a new and essential yet not clearly or widely understood management skill. This book’s extract’s purpose is to provide a fact-based understanding of the Code Halo phenomenon and outline a practical approach to improving performance by harnessing their power.

        View E-Handbook
      • HR Technology Key Trends 2014

        HR Directors and leading IT suppliers give their take on the HR technology trends for 2014 in this in-depth report from HR Zone.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Overview of the Open Group Security Forum

        The Security Forum is a membership group of security experts from both the customer and supply sides of industry, government, and academia, who share a common aim to raise confidence levels in IT business operations. We identify information security business requirements and develop standards and guides that respond to them. Our global scope looks across all industries towards what is common to all, benefiting IT suppliers and consumers alike. Our security strategy is focused on Security Architectures and Security Management – see our current list of projects, overleaf. We host quarterly Security Practitioners Conferences, where invited expert speakers address strategic issue within our interest areas.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • The insider threat – solved with DRM

        This report from analyst group Quocirca looks at the challenges faced by organisations when it comes to the insider threat and the protection of sensitive information.

        View E-Handbook
      • Legal briefing: The Draft EU General Data Protection Regulation

        On October 25, 2013, the European Council concluded that the new Data Protection Framework should be adopted in a timely manner in order to strengthen consumer and business trust in Europe’s digital economy.The Council did, however, refuse to commit to adoption by early next year. This conclusion follows on the heels of the European Parliament’s Civil Liberties, Justice and Home Affairs (LIBE) Committee vote setting out its position on a compromise text of the draft Regulation on October 21, 2013. After some 18 months of intense discussions and lobbying, the compromise text was passed by the LIBE Committee with a 49-3 majority. The compromise text was heavily influenced by the revelations of the surveillance activities of the U.S. National Security Agency (NSA). This report from Morrison & Foerster, sets out some of the most important changes for private sector organizations proposed by the LIBE Committee.

        View E-Handbook
      • Computer Weekly Buyer's Guide to data security

        As the smartphone phenomenon has taken off, chief information security officers have needed to rethink what personal computing security really means –especially as the European Commission seeks to harmonise data protection law across EU member states.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 2
      • Optimising the data warehouse

        Dealing with large volumes of mixed data to give better business insights. The data warehouse is struggling to keep pace with an organisation’s data needs. Extraction, transformation and loading (ETL) tasks are being stretched beyond their capabilities, and organisations wedded to maintaining a standard ETL, relational data approach are finding that they have to cut corners in order to get some level of results from their analysis and reporting. However, a different approach can add a lot more value – and make the data warehouse work again.

        View E-Handbook
      • Data on the Balance Sheet

        This report from the Centre for Economics and Business Research (Cebr), discusses the economic arguments for placing ‘data’ as an asset on the company balance sheet and in the wider financial reporting framework. Data that enable a company to improve customer relations, streamline production or develop new products are providing future economic benefit and should be regarded as assets. It is increasingly important that firms are able to account for their data. Firstly, regulatory and compliance initiatives are putting greater emphasis on the quality of data and resulting decision-making in the aftermath of the financial crisis. Secondly, for financial reasons, data that play an increasingly important role in value creation must be recognised if they are to be accorded appropriate priority by company decision-makers.

        View E-Handbook
      • Gartner: Deriving value from Big Data for CRM

        Big data presents many CRM opportunities, but to be effective and derive business value, customer insights generated by well-managed and analysed big data must be put into action. During the next few years, most companies will struggle to realise customer relationship management (CRM) business value from big data strategies. The first key to success will be identifying relevant customer processes across marketing, sales, customer service and e-commerce that can benefit from actionable, big data customer insights. Once a customer process has been identified as a big data opportunity, CRM leaders working with CIOs should follow four critical steps to derive business value:

        View E-Handbook
      • Integrating and monitoring business-to-business (B2B) value chains

        Increasing globalisation and diversity of both the suppliers and customers a given organisation has to deal with mean that supply chains are becoming ever more complex. Maintaining capabilities across broad functions requires systems that are well integrated, audited, secure and capable of being reported on at a granular level. Cloud-based approaches introduce new opportunities to gain access to advanced functionality, but also introduce issues around B2B integration for organisations.

        View E-Handbook
      Page 1 of 2
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Inside the mind of IT professionals

        This unique study by the Psychological Consultancy shows the unique personality traits of IT professionals, and what drives them compared to professionals in a range of other industries.

        View E-Handbook
      • Coding for Kids

        Get started with coding with this extract from Coding for Kids, which includes a 30% discount code for Computer Weekly readers.

        View E-Handbook
      • European IT Law Briefing: Monitoring employees' use of social media

        This briefing from leading European law firms highlights the key legal requirements for companies monitoring employees’ social media use in France, Germany, UK and Italy The briefing is based on a seminar by the law firms: SKW (Germany), Portolano (Italy), Bersay (France), and Kemp Little (UK) in London on 30th April 2013.

        View E-Handbook
      • European IT Law Briefing: Recruitment and social media

        The use of social media has become common in modern recruiting processes. Social media enables employers to present themselves online, to inform third parties about current vacancies in their enterprise and to conduct background checks on applicants alongside official application documents. This briefing from 4 leading European law firms gives you the key legal facts on using social media for recruitment, pre-employment screening and background checks on potential job candidates. The briefing is based on a seminar by the law firms: SKW (Germany), Portolano (Italy), Bersay (France), at the offices of Kemp Little (UK) in London on 30th April 2013.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Business Continuity Management Systems

        This downloadable extract focuses on the practical elements of business continuity management and considers them from a management system perspective: Where should the emphasis be when it comes to fitting your Business Continuity Management (BCM) arrangements into a management system? The chapter uses six phases of the BCM lifecycle as a focal point and offer top tips for you to consider when developing your Business Continuity Management System (BCMS).

        View E-Handbook
      • Practical Data Migration: PDMv2

        In this chapter from the second edition of his book, Morris outlines PDMv2 and show how it overcomes common data migration problems by using a set of integrated modules that cover the whole scope of a data migration from project start-up to legacy decommissioning and beyond. The chapter also gives a brief overview of the types of software technology available to support data migration.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • A Sustainable Print Agenda

        With pressure mounting on organisations to reduce their environmental impact, sustainability is still high on the corporate IT agenda, despite the challenging economy. Although interest in green IT is growing, the impact of printing is often overlooked. However, left uncontrolled, it can be a huge source of waste – both financial and environmental. A “less-paper” office based on an optimised print infrastructure can be a prime enabler for sustainability. Using intelligent print management and document workflow tools can enable organisations to significantly reduce their environmental impact while cutting costs, driving operational efficiency and improving regulatory compliance.

        View E-Handbook
      • Key legal and commercial issues with data centre services

        This briefing from law-firm DLA Piper looks at the main types of data centre services that are available on the market, common pitfalls to avoid when purchasing data centre services and some of the key legal and commercial issues to consider.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Next Generation Data centre Index – Cycle III

        This third cycle of the next generation data centre (NGD) research, shows that progress in how organisations in the UK, Europe and the Middle East, are preparing for changes in the way ITC is used to support their businesses has stalled for many organisations. However, detailed analysis shows how those who are investing in certain areas – and just changing the mind-set of how they approach ITC – are well ahead of those who are just trying to save money.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Information security in the retail chain

        This article in our Royal Holloway Information Security Thesis Series looks at how automated distribution centres play a business-critical role in the retail supply chain, and any challenge to their continuous availability and the services they provide must be overcome.

        View E-Handbook
      • Computer Weekly Buyer's Guide to Retail IT

        Is the demand to keep up with the latest IT trends leaving the back-office functions of security and supply chain management and data analysis to wither on the vine? Our eight-page Buyer’s Guide to Retail IT assesses the implications and challenges facing CIOs and senior IT professionals.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Financial Services Data Privacy and Data Migration

        Keith Bucknall, head of Strategy, Architecture & Infrastructure for Lloyds motor insurer, ERS, looks at the data protection challenges faced by the organisation, in this PowerPoint presentation for Computer Weekly’s 500 Club for IT leaders. You can read more about his presentation here.

        View E-Handbook
      • Governance, Risk Management and Compliance (GRC)

        An organisation has multiple stakeholders that need to be communicated with or reported to on a regular basis. Employees, partners, customers and suppliers are part of this community, alongside shareholders, trade and government bodies. Ensuring that all the stakeholders’ information needs are met requires a holistic approach to managing information – the creation of a GRC platform.

        View E-Handbook
      • Home Business Continuity: Availability, recovery and archive Business Continuity: Availability, rec

        Changes in how technology can be implemented and improvements in connectivity mean that business continuity and rapid systems recovery is now within the reach of many more organisations. Combined with granular information recovery, organisations should now be looking at creating a multi-level strategy to ensure not only survival, but also on-going business capabilities through any impact on the technical platform.

        View E-Handbook
      • WAN Speak Musings – Volume I

        The network is a dynamic place and the knock-on impact on the rest of IT is more than just a case of occasional lost connectivity or slow response. This report contains 12 short articles that look not just at direct wide area network (WAN)issues, but also at other areas of the ITC platform and the possible impact on an organisation.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Recommendations on rolling back government surveillance

        Legislation, judicial review through the FISA Court, and testimony have failed utterly in terms of providing meaningful oversight - both historically and currently – over the US electronic intelligence gathering organisation, the NSA, 4 former senior NSA staff argue in this report. They present their recommendations for reform. This report was compiled by 4 former senior NSA staff: William Binney, former Technical Director, World Geopolitical & Military Analysis; Co-founder of the SIGINT Automation Research Center. Thomas Drake, former Defense Intelligence Senior Executive Service, NSA Edward Loomis, former Chief, SIGINT Automation Research Center, NSA J. Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA

        View E-Handbook
      • Computer Weekly Buyer's Guide to Government IT

        While the pace of the move to open source in the public sector has been slow so far, a number of factors are converging to determine the blueprint for its future use in government IT. These include the Cabinet Office’s consultation to define the use of open standards in government and G-Cloud, which is supposed to make it easier and less costly to become a government supplier. This guide takes you through the initiatives under way and reveals how they could benefit your business.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 2
      • Trends in packing and obfuscation

        This article in our Royal Holloway Information Security Thesis Series looks at how two modern malware methods fit into today's landscape of advanced persistent threat and cyber crime as a service, and what the security industry can do to defend against them.

        View E-Handbook
      • Building trust in the security of RFID systems

        This article in our Royal Holloway Information Security Thesis Series looks at the growing need for automated tools to verify protocols and address concerns over security and privacy.

        View E-Handbook
      Page 1 of 2
    • Page 1 of 1
      • Encryption in the cloud

        This article in our Royal Holloway Information Security series assesses challenges of providing effective encryption to data stored in the cloud.

        View E-Handbook
      •  
      Page 1 of 1