Computer Weekly Buyer's Guide features list 2020

Here is our 2020 schedule of up-and-coming in-depth articles that will cover carefully selected topics to help IT leaders select the right technology for their organisation

Computer Weekly Buyer’s Guides map the IT buying cycle of our readership onto relevant editorial that will inform and educate readers and help them in making the right buying decision.

On a three-week cycle, the publication runs a series of articles focused on a particular category of software/hardware/IT service. Articles appear in the features section of the Computer Weekly ezine, which can be downloaded as a PDF or viewed as an SEO-optimised Buyer’s Guide page on the Computer Weekly website.

The Buyer’s Guide PDF downloads point readers to the online Buyer’s Guide, where they will be able to access all the articles in one place, along with additional content, such as blog posts and related articles.

The editorial team updates the Buyer’s Guide schedule on a quarterly basis to ensure the chosen technologies are topical and to respond to short-term commercial opportunities.

Buyer’s Guides comprise three separate features, which combine to become a standalone piece of evergreen content that readers can refer back to.

Each part includes a written article, plus relevant background material, as well as exclusive online-only multimedia content and infographics.

Format of Computer Weekly Buyer’s Guides

Market overview
This is an introduction to the topic covered in the Buyer’s Guide. The article will examine the nature of a given software/hardware/IT services product category, look at where it fits in the business, why users need it and which companies sell products in this category.

Analyst perspective
Here, Computer Weekly invites leading IT analysts to submit relevant research that can help readers narrow down product choices with a shortlist of products they may wish to investigate further.

Case study
At this stage in the buying cycle, the reader has a shortlist and may have given his/her technical people a brief to research the products in more detail, such as by following up customer references from the supplier. Computer Weekly supports this research with an in-depth case study, selected for its uniqueness, which illustrates best practices, technical and business drivers, lessons learnt and future plans of a successful IT project using one of the products shortlisted.

Please email Cliff Saran for further details.

The proposed schedule for H1 2020 is as follows:

Computing at the Edge

Jan 7 - Jan 27

In this series of articles we will explore how IT architectures are being adapted to make use of local processing combined with cloud-based processing. For instance, heavy machinery may require local processing to run AI algorithms in order to make real time operational decisions, but  this data is fed up to the cloud, for advanced analytics. What are the use cases, IT architectural issues, networking concerns, security/privacy implications of combining edge computing with public cloud computing?

Onsite/offsite and cloud-based disaster recovery

Jan 28 - Feb 17

The big question for any organisation in terms of DR is what Recovery Time Objective (RTO) and Recovery Point Objective (RPO) they need and what level of performance they need when they recover. This governs whether disaster recovering is on-site, off-site, cloud or something that makes use of all of these. In this series of articles we will look at options for synchronously mirrored data centres; failing over to a virtual environment and second site; failing over to the cloud and a hybrid approach.

Zero trust

Feb 18 - Mar 09

By eliminating trust on a network, IT security is simplified. In essence, it means that there are more trusted interfaces, no more trusted users, no more trusted network packets and no more trusted applications. But to achieve this, the security architecture needs to ensure that all networked resources are accessed in a secure manner and access control is strictly enforced on a need to know basis. Tight monitoring of the environment is the third pillar of the zero trust model. We look at how organisations are moving from traditional network security to a zero trust architecture.

Network upgrades for cloud native infrastructure

Mar 10 - Mar 30

As networking equipment rapidly evolves to being software-defined and cloud-native, there is growing interest in products and services for automating deployment, scaling resources and improving lifecycle management in order to accelerate service delivery, improve end-user experiences, and reduce infrastructure and operational costs in service delivery applications. We look at how computing is driving a revolution in networking.

Application modernisation

Mar 31 - Apr 27

Unlike digital first organisations, traditional businesses have a wealth of enterprise applications built up over decades, many of which continue to run core business processes. In this series of articles we investigate how organisations are approaching the modernisation, replatforming and migration legacy applications. We look at the tools and technologies available, change management and the use of APIs and containerisation to make legacy functionality and data available to cloud-native applications.

Modernising public sector 

Apr 28 - May 18

As they become more digitised, the public sector is having to rethink the role of IT, shifting from an outsourced model and migrating applications from on-premise datacentres to the cloud. In this series we explore how public sector IT-powered services are moving from back-end processing to citizen facing digital services, making greater use of web transactions and apps, such as the rollout of online online patient records e-prescription in the health service. They are also modernising procurement, shifting away from large multi-year deals with the major public sector IT providers to make it easier to work with SME IT providers.

Datacentre cooling technologies

May 19 - Jun 08

Every tweet or social media update uses CPU cycles, which uses a tiny amount  of electricity and generates a tiny amount of heat. But multiply this a billion times, and datacentres can quickly overheat.  The industry has shifted to and from air-cooling and water cooling methods of keeping the processors in datacentres at operating temperatures. Air-cooling is not a best fit for HPC installations, supercomputing, or machine learning workloads. There are also questions over the effectiveness of water-cooling and the environmental impact of waste datacentre water, leading to renewed interest in refrigerants. In this series of article we investigate how the datacentre industry is keeping chips cool

Data quality

Jun 09 - Jun 29

Organisations are becoming more data-driven, which means that data is increasingly being used to gather new insights. Data is also use as inputs to drive automation and to improve the accuracy of machine learning and predictive analytics. Poor quality data results in poor decision-making and biased or inaccurate data models. In this series of articles we explore how machine learning, interactive visualisation and predictive/prescriptive analytics are now being used to improve data quality.

Flash Storage

Jun 30 - Jul 20

Given that replacing spinning disk arrays with Nand-based flash drives is the direction the datacentre industry is heading, in this series of articles we explore how to configure flash storage to get the best price performance and assess public cloud-based flash offerings. We also look at the reliability and longevity of flash-based storage. 

AI in cybersecurity

Jul 21 - Aug 10

Given that hackers are using advanced techniques to break into corporate and government IT systems,  we assess the merits of using ML, AI and RPA to manage IT security, roll out patches and tackle zero day attacks automatically. Potentially AI can be used to enable organisations to operate a IT predictive security stance and automate reactive measures when needed.

Modern software development practices

Aug 11 -  Sep 7

Is modern software development about building cloud-native, cloud-first and multi-cloud applications? Is it about embracing data-driven big data insights and making inherent use of Artificial Intelligence (AI) and Machine Learning (ML)? Or is it about granular code reuse and low coding tools. In this series we explore what it means to be a modern software developer.

Mobile networks to support the modern workplace

Sep 8 - Sep 28

The coronavirus pandemic and lockdown has highlighted the need for good internet connectivity, especially given the rise in the use of video conferencing and virtual events to replace physical meetings. In this series we look at what measures and technologies IT departments can put in place to ensure people who work remotely can have the security and reliability of an enterprise WAN when they are at home.

Supply chain resiliency and  the impact on corporate IT

Sep 29 - Oct 19

The issues relating to personal protection equipment during the coronavirus pandemic, has put into focus the risk of real time and on-demand production. What are companies having to do to maintain supply chains? As economies shift from efficiency to resilience, from just-in-time to just-in-case, what does that mean for companies operating internationally? How will companies rethink supply chain management, and what will that mean for corporate IT?

Intelligent Workload management

Oct 20 - Nov 09

As IT departments embark on cloud-first initiatives, they need to assess where best to deploy the application. Can the application run on a public cloud? If so, which cloud is most cost-effective? At what level of usage does economic benefits diminish?  Along with cost concerns, increasingly complex IT deployments require orchestration of multiple services, all of which need to be managed and monitored. We explore the latest trends in workload management tools.

Automating business processes

Nov 10 - Nov 31

As businesses strive for greater efficiency, many are looking at how to automate tasks that were previously manual. Among the steps they need to take is to assess the efficiency of the end-to-end business process. An inefficient business process is not optimal, no matter how much automation is used. In this series of articles we look at how businesses have optimised business processes, and where and when automation has been deployed.

Latest retail tech

Dec 01 - Dec 31

It has been another tough year for retail. How are retailers using technology to entice customers to come back to the high street? In this series we look at some of the cutting edge technologies that are set to change the nature of high street shopping.

Read more on IT strategy

CIO
Security
Networking
Data Center
Data Management
Close