azizulhakim365 - stock.adobe.com
Computer Weekly Buyer’s Guide features list 2026
Here is our 2026 schedule of up-and-coming in-depth articles that will cover carefully selected topics to help IT leaders select the right technology for their organisation
Computer Weekly Buyer’s Guides map the IT buying cycle of our readership onto relevant editorial that will inform and educate readers and help them in making the right buying decision.
On a three-week cycle, the publication runs a series of articles focused on a particular category of software/hardware/IT service. Articles appear in the features section of the Computer Weekly ezine, which can be downloaded as a PDF or viewed as an SEO-optimised Buyer’s Guide page on the Computer Weekly website.
The Buyer’s Guide PDF downloads point readers to the online Buyer’s Guide, where they will be able to access all the articles in one place, along with additional content, such as blog posts and related articles.
The editorial team updates the Buyer’s Guide schedule on a quarterly basis to ensure the chosen technologies are topical and to respond to short-term commercial opportunities.
Format of Computer Weekly Buyer’s Guides
Market overview
This is an introduction to the topic covered in the Buyer’s Guide. The article will examine the nature of a given software/hardware/IT services product category, look at where it fits in the business, why users need it and which companies sell products in this category.
Analyst perspective
Here, Computer Weekly invites leading IT analysts to submit relevant research that can help readers narrow down product choices with a shortlist of products they may wish to investigate further.
Case study
At this stage in the buying cycle, the reader has a shortlist and may have given his/her technical people a brief to research the products in more detail, such as by following up customer references from the supplier. Computer Weekly supports this research with an in-depth case study, selected for its uniqueness, which illustrates best practices, technical and business drivers, lessons learnt and future plans of a successful IT project using one of the products shortlisted.
Please email Cliff Saran for further details.
Buyer’s Guides comprise three separate features, which combine to become a standalone piece of evergreen content that readers can refer back to.
Each part includes a written article, plus relevant background material, as well as exclusive online-only multimedia content and infographics. Here is the schedule for H1 2026:
Data sovereignty
13 January to 2 February
The past few years have seen increasing awareness concerning data residency and the ability to maintain access to corporate data and applications delivered as a cloud service, given the current geopolitical climate. This series of articles explores how IT and business leaders can work with IT providers to ensure they have continued access to data and enterprise applications.
AI in security tools
3 February to 23 February
Predictive analytics, machine learning and artificial intelligence promise to revolutionise threat detection, offering automation of incident response and the ability to run risk assessments dynamically. We find out how new tooling is helping IT security experts tackle next-generation cyber attacks.
Neoclouds
24 February to 23 March
While hyperscalers are focusing on building out huge arrays of AI-acceleration hardware layered with software stacks, there is growing demand for bare metal hosted services, focused simply on providing the graphics processor unit hardware businesses need to deploy their own AI infrastructure. In this series, we explore neoclouds and look at how they are being used.
Managing AI’s energy footprint
24 March to 13 April
The International Energy Agency (IEA) projects that datacentres – both AI-driven and non-AI-driven – could use 80% more energy in 2026 than in 2022. While next-generation hardware is more efficient, we assess how datacentres are addressing AI power demand.
Persistent storage for containers
14 April to 5 May
In this series of articles, we look at how enterprise IT is delivering the storage requirements needed by traditional applications when they are adapted to run in a cloud-native environment using containerisation.
AI for network admins
5 May to 8 June
The flow of network packets provides a rich dataset for training machine learning and predictive analytics. In this series of articles, we explore current trends in the use of AI-enabled tools that use advanced modelling to help network administrators manage networks more effectively.
Resilient identity and access management
17 June to 6 July
We assess the intersection of AI and IAM. In this series of articles we explore the shift from identity management to identity intelligence.
Machine learning/GenAI/agentic in supply chain management
7 July to August 3
Advanced analytics and AI, such as machine learning and predictive/prescriptive analytics are part of the functionality available to improve forecast accuracy, detect problems and fine-tune planning decisions. GenAI and agentic AI extends these capabilities. We look at how these supply chain technology advances are being deployed.
How to resist (AI-driven) cyber attacks
August 4 to August 31
Is Claude Mythos a benefit or barrier to achieving resilient enterprise IT security? There will inevitably be more powerful AI systems going forward. What should CISOs do to reduce the risk of being breached by a vulnerability in their cyber defences uncovered and exploited using AI.
Edge computing
Sep 1 to Sep 21
In this series of articles, we look at how organisations are providing secure and fully managed edge computing capabilities.
Sizing and speccing on-prem AI infrastructure
Sep 22 to Oct 19
We look at the software and hardware infrastructure organisations are deploying to support AI inference and training workloads in private clouds and on-premise, the IT architecture choices they have and the return on investment.
Process mining
Oct 20 to Nov 9
In this series of articles we find out how businesses can use software to identify inefficiency in end-to-end business processes.
Public Cloud carbon footprint
Nov 10 to Nov 30
We investigate the transparency around the carbon footprint of various public cloud platforms and look at how their customers report on sustainability when taking into account their public cloud footprint.
Securing agentic AI
Dec 1 to Dec 31
We assess the impact of agentic AI in an organisation’s cybersecurity strategy and the steps chief information security officers and IT chiefs should take to provide AI agents with safe, secure authorised access to internal datasets and enterprise applications.
