IT news in your industry sector

Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How to be influential online

    Communicating persuasively may be a tricky art to perfect, but when it’s done properly, the pay-off can be huge, which is why marketing campaigns continue to siphon off huge amounts of corporate money every year. If you want your message to reach and influence your target audience there is one golden rule you must follow: tailor your communication style to the medium you’re using.

  • How to source cyber threat intelligence

    Some pointers on how to select the best sources of cyber threat intelligence

  • The Mindset of the Chief Information Officer

    This study evaluates the leadership role that Chief Information Officers performs in helping their organisations achieve their commercial goals. It examines the skills and behaviours that contribute to their success and considers the relationships the CIO has with the CEO, the executive team and other influential stakeholders. This study, which draws on interviews with leading CIOs, provides senior IT executives with insights to help them reflect on their leadership roles and to consider areas for their own professional development.

  • Supporting requirements management in TOGAF

    Requirements management is an important activity in the process of designing and managing enterprise architectures. Requirements from various stakeholders form the basis for any change to an organization and its architecture. The quality of these requirements, the extent to which they are realized, and the ease with which they can be changed, determine the quality of any enterprise architecture. Nonetheless, many enterprise architecture modeling techniques focus on what the enterprise should do by representing “as-is” and “to-be” architectures in terms of informational, behavioral, and structural models at the different architectural layers (e.g., business, application, and technical infrastructure). Little or no attention is paid to represent (explicitly) the reasons; i.e., the why, behind the to-be architectures in terms of motivations, rationale, goals, and requirements.

  • Business Secretary calls for TSB’s funding to be doubled

    Business Secretary Vince Cable has urged the government to double the Technology Strategy Board’s (TSB) funding

  • Open Group technical document: IT Specialist Certification Accreditation Policy

    Clearly “book learning” is a critical first step to becoming effective at anything. But the effectiveness, potential, and the degree and value of contribution rise to a new level as relevant skills and experience are gained in a topical area. It is clearly important to “know” a subject, but it is more valuable to have applied that knowledge. It is for this reason that The Open Group IT Specialist Certification (ITSC) program is based on an assessment of people skills, technical skills, and experience, not just tests of knowledge.

  • Privacy key to UK business opportunity, says KPMG

    Finding the right balance between privacy and business insight could help UK firms take the lead in innovative online services, says KPMG

  • UK man with leaked Tata staff database in alleged blackmail attempt

    A UK man and Tata Consultancy Services (TCS) are embroiled in a case alleging that he tried to blackmail the IT services firm.

  • Total internet failure: are you prepared?

    A total internet failure could stop any business in its tracks, yet few are preparing for this possibility, KPMG has warned

  • Brazil's World Cup humiliation softened by Twitter success

    Despite not winning the World Cup, host nation Brazil can take solace in the fact its team was the most Tweeted about

  • VIEW MORE ON : Business services IT