Premium Content

ComputerWeekly E-Handbooks

Featured E-Handbooks

Other E-Handbooks available for free to our members

    • Page 1 of 19
      • Business Continuity Management Systems

        This downloadable extract focuses on the practical elements of business continuity management and considers them from a management system perspective: Where should the emphasis be when it comes to fitting your Business Continuity Management (BCM) arrangements into a management system? The chapter uses six phases of the BCM lifecycle as a focal point and offer top tips for you to consider when developing your Business Continuity Management System (BCMS).

        View E-Handbook
      • Guide: Maximizing the Value of Cloud for Small-Medium Enterprises

        Cloud computing models are promising significant cost, scalability, and agility benefits, but is there a business case for small business owners to move from traditional IT provisioning to a cloud-based solution? And, if so, how can small business owners adopt the cloud? This guide is designed to help small business owners navigate through cloud services and identify those that will best help them to meet their needs.

        View E-Handbook
      • CW Buyer’s Guide: Virtual desktops in the enterprise

        In this Computer Weekly buyer’s guide to virtual desktops, we investigate the latency and bandwidth issues that arise with thin client access, take a look at cloud economics in the datacentre, review Citrix’s XenDesktop 5 desktop virtualisation application, and see how virtualisation and business process optimisation work at the Co-operative

        View E-Handbook
      • CW Buyers Guide: Green IT

        With IT such a large energy drain for many organisations, firms that cut IT power consumption will reap big benefits. Going green means that computer room air conditioners and chillers are no longer required in the datacentre, potentially slashing energy costs by up to 50% and dramatically lowering the facility’s carbon footprint.

        View E-Handbook
      • How to be influential online

        Communicating persuasively may be a tricky art to perfect, but when it’s done properly, the pay-off can be huge, which is why marketing campaigns continue to siphon off huge amounts of corporate money every year. If you want your message to reach and influence your target audience there is one golden rule you must follow: tailor your communication style to the medium you’re using.

        View E-Handbook
      • How to embed innovation in the corporate culture

        Innovation often features high on CIOs’ agendas because it is recognized as being an important means by which information systems and technology can contribute positively to the evolution and performance of the business. However, in practice the execution often falls short of the ambition. Reasons for this range from the mundane, such as there being insufficient time or capacity to devote to it, to the more fundamental, such as organizational or cultural barriers, or insufficiently defined processes and governance for capturing ideas and seeing them through to fruition.

        View E-Handbook
      Page 1 of 19
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Special Report on Infosys

        This 6 page special report from Computer Weekly gives you the key facts on Infosys, its strategy, products and services and financial performance.

        View E-Handbook
      • Special Report on Adobe

        This special 7-page report from Computer Weekly, updated for 2014, analyses the challenges facing Adobe, its financial performance, the services and products it offers, its place in the IT market and its future strategy.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Governance in IT and Architecture - TOGAF

        The primary audiences for this Paper are business and IT managers who are responsible for the performance of operations. However, enterprise architects also play a key role in supporting IT governance, including architecture governance. Governance is defined as giving direction to activities. In this Paper, the authors focus on governance of the IT domain and its alignment to business. Governance is viewed as a mechanism that influences the internal logic and decision-making of organizations. The internal logic is defined as a compromise between practically conflicting parameters. The mechanism that has to deal with these conflicting parameters consists of decision domains, governance structure, social processes between individuals and groups, and controls to ensure the proper functioning of IT governance. In the context of IT governance, enterprise architecture can be considered as a means for coordination of decision-making related to IT and business. Furthermore, it is recognized that enterprise architecture in its own right also needs to be governed.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • CW Buyer’s Guide: Virtual desktops in the enterprise

        In this Computer Weekly buyer’s guide to virtual desktops, we investigate the latency and bandwidth issues that arise with thin client access, take a look at cloud economics in the datacentre, review Citrix’s XenDesktop 5 desktop virtualisation application, and see how virtualisation and business process optimisation work at the Co-operative

        View E-Handbook
      • Computer Weekly Buyer's Guide to infrastructure on demand

        Working out how to make infrastructure on demand work for your company is a challenge. In this 10-page buyer's guide, Computer Weekly looks at assessing the needs of your business, assess how a lack of standards is hindering progress, and assess Microsoft's Azure which aims to become an operating system for the cloud.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • CW Special Report on Symantec

        Packed with graphs and diagrams and tables, this independent analysis by Computer Weekly is essential reading for any organisation working with, or thinking of working with Symantec.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Guide: Maximizing the Value of Cloud for Small-Medium Enterprises

        Cloud computing models are promising significant cost, scalability, and agility benefits, but is there a business case for small business owners to move from traditional IT provisioning to a cloud-based solution? And, if so, how can small business owners adopt the cloud? This guide is designed to help small business owners navigate through cloud services and identify those that will best help them to meet their needs.

        View E-Handbook
      • Technology, innovation and change: the IT department's view

        Developments in information technology are driving innovation across every sector of the economy. The convergence of mobile technology, cloud computing, social networking and data analytics is disrupting old business models. This report, based on a quantitative survey of 150 IT professionals, is the second report on technology innovation and change from Computer Weekly and Theron LLP.

        View E-Handbook
      • Computer Weekly Buyer's Guide to customer relations (CRM)

        This nine-page Buyer's Guide to Customer Relationsip Management (CRM), written by Computer Weekly speciaists, analyses the factors CIOs and senior IT professionals need to consider as they plan their CRM strategies.

        View E-Handbook
      • Computer Weekly Buyer's Guide to asset management

        IT departments need information on what assets they have, where they are, who is using them, the services they support, what they cost and how they are configured. They must also be able to ascertain whether the business is compliant, the value the IT assets deliver and whether the company is fully exploiting its IT assets. In this 10-page buyer’s guide, Computer Weekly looks at how IT asset lifecycle management can help CIOs manage their organisation’s technology assets, from services and software licences to physical and virtual infrastructure.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • The Single Unix Specification

        The Single UNIX Specification programming environment provides a broad-based functional set of interfaces to support the porting of existing UNIX applications and the development of new applications. The environment also supports a rich set of tools for application development.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • CW Special report on Atos

        This 9 page special report, updated for 2014, gives you the facts on Atos, its strategy, products and services and financial performance.

        View E-Handbook
      • CW Special Report on CSC

        The acquisitive IT outsourcer has grown and evolved over the years, but the company is returning to its origins as it undergoes a huge restructuring exercise and moves into cloud services.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • CW Special Report on HP

        This 12 page special report from Computer Weekly, updated for 2013, gives you the facts on HP, its strategy, products and services and financial performance.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Overview of the Open Group Security Forum

        The Security Forum is a membership group of security experts from both the customer and supply sides of industry, government, and academia, who share a common aim to raise confidence levels in IT business operations. We identify information security business requirements and develop standards and guides that respond to them. Our global scope looks across all industries towards what is common to all, benefiting IT suppliers and consumers alike. Our security strategy is focused on Security Architectures and Security Management – see our current list of projects, overleaf. We host quarterly Security Practitioners Conferences, where invited expert speakers address strategic issue within our interest areas.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Computer Weekly Buyer's Guide to data security

        As the smartphone phenomenon has taken off, chief information security officers have needed to rethink what personal computing security really means –especially as the European Commission seeks to harmonise data protection law across EU member states.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Open Group: FAIR -ISO/IEC 27005 Cookbook

        This document discusses the different purposes of the two standards, how to reconcile the two with regard to terminology and process, and combine the best elements of both to produce a consistent, repeatable risk management process.

        View E-Handbook
      • World-class enterprise architecture

        The world is changing at a pace faster than ever experienced. Several trends in demographics, technology, the environment, globalization, public attitudes, and political institutions are driving Government and Industry agendas as never before. In order to respond to the demands and needs of their stakeholders, organizations need to develop new and better ways of managing continuous change at ever-increasing pace to deliver significant value in a transparent manner. Organizations need an enterprise architecture function as an integral capability in order to support the requirement for continuous change. However, over the years, many organizations have attempted to set up enterprise architecture practices only to see them fail after a few years. These failures are due to several reasons, such as an inability to merge enterprise architecture processes with the other management processes within the organization – for example, demand management – or the lack of authority for enterprise architects – for example, when making strategic decisions or quality assuring programs and projects. In spite of these previous failures, organizations are again trying to set up enterprise architecture functions as they have found that no other pragmatic alternatives exist.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Business Continuity Management Systems

        This downloadable extract focuses on the practical elements of business continuity management and considers them from a management system perspective: Where should the emphasis be when it comes to fitting your Business Continuity Management (BCM) arrangements into a management system? The chapter uses six phases of the BCM lifecycle as a focal point and offer top tips for you to consider when developing your Business Continuity Management System (BCMS).

        View E-Handbook
      • Practical Data Migration: PDMv2

        In this chapter from the second edition of his book, Morris outlines PDMv2 and show how it overcomes common data migration problems by using a set of integrated modules that cover the whole scope of a data migration from project start-up to legacy decommissioning and beyond. The chapter also gives a brief overview of the types of software technology available to support data migration.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Computer Weekly Buyer's Guide to Retail IT

        Is the demand to keep up with the latest IT trends leaving the back-office functions of security and supply chain management and data analysis to wither on the vine? Our eight-page Buyer’s Guide to Retail IT assesses the implications and challenges facing CIOs and senior IT professionals.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Computer Weekly Buyer's Guide to Government IT

        While the pace of the move to open source in the public sector has been slow so far, a number of factors are converging to determine the blueprint for its future use in government IT. These include the Cabinet Office’s consultation to define the use of open standards in government and G-Cloud, which is supposed to make it easier and less costly to become a government supplier. This guide takes you through the initiatives under way and reveals how they could benefit your business.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Encryption in the cloud

        This article in our Royal Holloway Information Security series assesses challenges of providing effective encryption to data stored in the cloud.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Secure internet routing

        This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • CW Special Report on Oracle

        This special repor gives an independent view of the challenges facing Oracle, its financial performance, the services it offers, its place in the IT market and its future strategy

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Open Group technical document: IT Specialist Certification Accreditation Policy

        Clearly “book learning” is a critical first step to becoming effective at anything. But the effectiveness, potential, and the degree and value of contribution rise to a new level as relevant skills and experience are gained in a topical area. It is clearly important to “know” a subject, but it is more valuable to have applied that knowledge. It is for this reason that The Open Group IT Specialist Certification (ITSC) program is based on an assessment of people skills, technical skills, and experience, not just tests of knowledge.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • How to embed innovation in the corporate culture

        Innovation often features high on CIOs’ agendas because it is recognized as being an important means by which information systems and technology can contribute positively to the evolution and performance of the business. However, in practice the execution often falls short of the ambition. Reasons for this range from the mundane, such as there being insufficient time or capacity to devote to it, to the more fundamental, such as organizational or cultural barriers, or insufficiently defined processes and governance for capturing ideas and seeing them through to fruition.

        View E-Handbook
      • The Open Group: Cloud buyers’ requirements questionnaire

        This White Paper describes a questionnaire that will help you identify your requirements for Cloud computing in a structured way, so that you can more easily reach the best solution. It contains questions about your enterprise – not about the products and services that you might be considering. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Open Information Security Management Maturity Model (O-ISM3)

        Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps information Security Managers to evaluate their own operating environment and to plan their security management processes so they are consistent with and cost-effective for their organization’s business objectives.

        View E-Handbook
      • The Open Group Architecture Framework (TOGAF™ 9) and the US DoD

        This White Paper provides a comparative analysis of the two frameworks that describes where DoDAF products can be employed throughout the TOGAF ADM phases to develop a visual, integrated model of an architecture. The intended audience is the DoD architect who can benefit from a formal methodology to guide architecture efforts and result in a quality architecture description in a DoD-compliant format, and the TOGAF architect who can benefit by a formal set of defined models to capture output for each of the ADM phases. This document provides the architect with a map of the specific DoDAF 2.0 model that should be produced or consumed in a specific phase of TOGAF 9 with enough context to understand the fundamental concepts of both DoDAF and TOGAF.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Information security for SMEs

        In this article, from our Royal Holloway Security Thesis series, we propose a simplified implementation approach for an information security management system (ISMS) for SMEs.

        View E-Handbook
      • Computer Weekly Buyer's Guide to IT for SMEs

        In the face of ongoing economic uncertainty businesses are coming under increasing pressure to do more with less. The easy answer is to lengthen refresh cycles and sweat assets, but this six-page buyer’s guide looks at more innovative methods that small to medium-sized enterprises can use to make the most economic and rewarding buying decisions for their business and extract the most value from their IT investments.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Supporting requirements management in TOGAF

        Requirements management is an important activity in the process of designing and managing enterprise architectures. Requirements from various stakeholders form the basis for any change to an organization and its architecture. The quality of these requirements, the extent to which they are realized, and the ease with which they can be changed, determine the quality of any enterprise architecture. Nonetheless, many enterprise architecture modeling techniques focus on what the enterprise should do by representing “as-is” and “to-be” architectures in terms of informational, behavioral, and structural models at the different architectural layers (e.g., business, application, and technical infrastructure). Little or no attention is paid to represent (explicitly) the reasons; i.e., the why, behind the to-be architectures in terms of motivations, rationale, goals, and requirements.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • The Cloud Risk Framework

        Companies that are considering moving to a cloud computing model need effective metrics and analytics to help guide their decisions. This cloud framework is designed to help assess the financial risks of moving to the cloud. This paper is aimed at private or public entities with more than 500 employees, and considers risk from their perspective

        View E-Handbook
      • Computer Weekly Buyer's Guide to optimising networks

        This six-page Computer Weekly Buyer's Guide to networking highlights the factors CIOs and senior IT professionals need to consider as they plan strategies for cloud computing and virtualisation networks.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • The Open Group Service Integration Maturity Model (OSIMM) Version 2

        Service Oriented Architecture (SOA) is an architectural style that supports service orientation. A service is a business task with an externalized service description that often represents a contract between a provider and a consumer. As organizations adopt SOA and the use of services as the fundamental structuring element of their architecture, they increasingly encounter the need to assess where they are in their migration path and how best to achieve the expected benefit derived from integrating and investing in greater levels of SOA maturity.

        View E-Handbook
      • IT Priorities 2014 Special Report

        Computer Weekly editors draw on their expertise to explain the main technology trends for IT in the UK and across Europe in 2014.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • CW Buyers Guide: Green IT

        With IT such a large energy drain for many organisations, firms that cut IT power consumption will reap big benefits. Going green means that computer room air conditioners and chillers are no longer required in the datacentre, potentially slashing energy costs by up to 50% and dramatically lowering the facility’s carbon footprint.

        View E-Handbook
      • The Open Group: Cloud buyers’ decision tree

        This White Paper describes a Decision Tree that could be used to help you discover where Cloud opportunities and solutions might fit in your organization. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises. Your business situation is either a problem or an opportunity for which you are seeking a solution that includes IT enablement. This Tree presupposes that the current and/or future state of the IT resources for your business situation does and/or will not meet requirements. If you are a Cloud seller, then use this Decision Tree in reverse to determine for which business situations your proposed offering would be a good fit.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • The Banking Industry Architecture Network and TOGAF

        Financial institutions are facing significant changes of the environment in which they operate. For example, the financial crisis, changing customer behavior, increased risk awareness, focus on cost reduction, and the entrance of new financial players in the market-place have structurally changed the financial industry. Not only the operations, but also the supporting IT required a challenging transformational change. Given the close inter-dependency of operations and IT in financial institutions, a carefully planned and guided integrated approach to change is required. Enterprise architecture is key to enabling such change initiatives.

        View E-Handbook
      • TOGAF® and SABSA® Integration

        This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Building return on investment from cloud computing

        Cloud Computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction [1]. This enables users to avoid over-provisioning and under-provisioning, to improve cost, revenue, and margin, and to provide new business services based on new ways of operating.

        View E-Handbook
      • Women in Technology 2014

        Are women flourishing in IT ? Find out by downloading the Women in techology report from Computer Weekly and Mortimer Spinks.

        View E-Handbook
      • CW Buyer's Guide To Finance and Insurance

        In this 11-page buyer’s guide, Computer Weekly looks at mitigating the risks of data breaches with liability insurance; the variety of ways to finance your organisation’s technology platforms in a world of rapid change; and funding software investment for the economic recovery while budgets remain tight.

        View E-Handbook
      Page 1 of 1