ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:TechTarget CIO

  • A closer look at ITSM and ITIL

    In this expert e-guide explore the various benefits ITSM and ITIL can provide including maximizing ROI and more.

  • How to implement ITSM and establish a strategy beyond IT metrics

    In this expert e-guide, learn how one CIO was able to leverage ITSM to improve business processes as well as incorporate the ITSM strategy to a mobile workforce.

  • CIO Decisions e-zine – October 2015, Volume 46

    In this e-zine, we explore what CIOs should know about the Internet of Things before they embark on an enterprise IoT project.

  • Data Security in a Breach-a-Minute Era

    Does your company have what it takes to rein in data security in today's cyberthreat landscape? Flip through this handbook to get the latest on security tools and tips from leading data security experts.

  • The Great Technology and Industry Disruptors

    In this issue of CIO Decisions, find out how top-tier IT leaders are transforming their businesses into industry disruptors.

  • Taking Inventory of the Cloud

    This edition of CIO Decisions e-zine delves into the importance of cloud inventory management for reigning in rogue cloud apps and the associated costs. Explore how CIOs are tracking cloud app use to determine app consolidation needs and to realize a better ROI.

  • Mobile Payment Methods Come of Age

    In this SearchCIO handbook, read about how mobile payment methods are maturing and how CIOs should gear up.

  • The Fate of the Enterprise Data Center

    Download this exclusive e-book to discover expert insight into the future of the data center. Inside, experts discuss five ways CIOs and IT executives can prepare their data centers for the future and who should run it. Also, learn why some CIOs believe there are good reasons for keeping services on-premises – even in the age of the cloud.

  • Taking the Guesswork Out of Data Ownership

    In this SearchCIO handbook, we explore how digital business has made data ownership a hot topic once again for CIOs in order to meet the needs of the digital business world and transform information into knowledge and knowledge into insights.

  • CIO Decisions E-zine

    Integrating a hybrid infrastructure -- one that includes applications running on-premises and applications running in the cloud -- requires new tools, more resources and a deep understanding of data.

  • The Digital Effect on Business Process Management

    Business process management in the digital era is a whole new deal. In this SearchCIO handbook, find out how businesses must adapt BPM systems to meet the needs of the digital customer.

  • Why Companies Must Combine Mobile and Data Analytics to Compete Effectively

    In today's mobile culture, delivering useful information to employees has become more complex. Find out how the marriage of mobile and big data is evolving in this issue of CIO Decisions.

  • Next-Generation Security in a Mobile Era

    Mobile security isn't just a matter investing more in security technologies. Access this handbook to learn what CIO expert Harvey Koeppel thinks it will take to reformulate your mobile security strategy and tackle today's mobile risks. Also uncover the top 10 mobile security risks, a 7-point checklist for guarding mobile apps and devices, and more.

  • Legacy IT Systems: Keep 'Em or Cut 'Em?

    How do you calculate the expiration date on your legacy IT systems? We explore the keep-vs.-cut dilemma in this issue of CIO Decisions.

  • How to Consolidate Application Portfolios

    When your closet needs a major clean-out and you don't have time to address it, you can simply shut your closet door and hide the clutter. A sprawling portfolio of apps, however, isn't as easy to mask. In our expert handbook, we explore key things for CIOs and CTOs to consider when planning an app modernization project.

  • CIO Decisions E-Zine - February 2015

    When it comes to high-profile data breaches, hindsight is 20/20. In this issue of CIO Decisions, we examine the new security paradigm and how CIOs are strategizing to protect data.

  • Profiting from big data

    To successfully capitalize on big data, an iterative, experimental approach is essential to data-focused companies, and especially retailers, analysts say. Find out how several organizations leverage big data.

  • CIO Decisions: Master Multichannel Customer Engagement

    Unscrambling the multiple channels by which customers engage calls for close collaboration between CIOs and their business peers. Learn more about multichannel customer engagement strategy in CIO Decisions ezine.

  • CIO Decisions: Artificial Intelligence in the Enterprise

    AI is not some far-off fantasy. Some experts predict that smart machines and robots will become so intertwined with business operations as to be indispensible—and some enterprises are already reaping the results.

  • Disaster Recovery: This is Not a Drill

    In this issue of Modern Infrastructure: CIO Edition, learn how to govern enterprise disaster response and recovery efforts and spring into action when true crisis strikes.

  • Big Data Architecture: Build, Buy or Blend?

    CIOs face a quandary in big data architecture: Do I buy or build? New business problems, inadequate vendor solutions and myriad new technologies complicate that question.

  • Head of the SaaS

    Software governance refers to a lot more than the management of company-commissioned applications. CIOs must rein in and govern a wide range of shadow services in the enterprise.

  • ITSM at Breakneck Speed

    It's a brave new world for IT service management. Managing IT services today requires CIOs to keep up with cloud, mobile and users' insistence on self-service IT. This SearchCIO handbook, CIO contributor Harvey Koeppel explains why you should revamp your ITSM strategies.

  • Cybersecurity Is Every CIO's Problem

    As breaches mount, many CIOs are finding that enterprise cybersecurity is a competitive advantage and are showing the business how security investments bolster the bottom line.

  • Cybersecurity Is Every CIO's Problem

    This CIO handbook gives you the knowledge you need to create cybersecurity that not only keeps you safe, but also builds trust among consumers and other businesses.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.