ComputerWeekly.com Research Library

Powered by Bitpipe.com

CIOs Research

  • The Executive's Guide to Breach Response

    Sponsored by: Hewlett-Packard Limited

    Download this white paper for a step-by-step guide on how to lead your organization through a crisis with comprehensive planning, sound leadership, and more.

  • The Importance of Senior Executive Involvement in Breach Response

    Sponsored by: Hewlett-Packard Limited

    In this white paper, discover survey results that reveal how IT pros feel about leadership and executive involvement in breach mitigation.

  • CIO Study: Hybrid Cloud Requires a Transition

    Sponsored by: NetApp

    Access this white paper to learn about how hybrid clouds are commencing a change in the roles of enterprise storage professionals.

  • How PACS Intergation Streamlines Radiology IT

    Sponsored by: GE Healthcare

    This expert guide will help you discover how you can integrate and optimize your PACS for improved workflow.

  • Top 5 data centre trends to watch in 2015

    Sponsored by: Dimension Data

    Access this white paper to explore what experts believe are the top trends to watch for data centers in 2015 and find out their expected impact on business.

  • 6 Steps to Smashing Silos in Your Business

    Sponsored by: Teradata

    This informative resource explains the steps that business leaders can take to prevent and break down silos within their organizations, particularly within marketing departments.

  • The four cornerstones of a successful BYOD program

    Sponsored by: Dell, Inc. and Intel®

    In this informative e-guide, learn about the four cornerstones of a successful BYOD program: quality of user experience, device flexibility, vendor independence, and security policy. Information is one of the most valuable pieces of an organization – discover how to implement to right BYOD policy to secure it

  • Computer Weekly – 24 March 2015: Government backs tech in 2015 Budget

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, chancellor George Osborne's 2015 Budget was the most technology friendly ever – we examine the key policy announcements. Sainsbury's CIO talks about the challenges of going digital. And we look at how virtual reality could be coming to a workplace near you, thanks to the latest developments. Read the issue now.

  • Next-Generation Security in a Mobile Era

    Sponsored by: SearchCIO.com

    In this SearchCIO handbook, learn how enterprise mobility management and next-generation security tools can help your enterprise mitigate an ever-growing number of mobile risks.

  • Computer Weekly – 10 March 2015: A world of mobile possibilities

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we report from Mobile World Congress, the world's biggest mobility event, on the latest innovations in mobile technology. Is the outsourcing industry set to cut thousands of jobs because of increasing IT automation? And we take an in-depth look at Google Container Engine. Read the issue now.

  • Best practices for systems and asset management

    Sponsored by: Crayon Group

    This e-guide explores the biggest systems management challenges, offers tips on the skill sets a system management admin should have, and helps guide your organization down the best path for IT asset management.

  • Computer Weekly – 24 February 2015: Banks take the fight to the web giants

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, with internet giants like Google, Apple and Facebook offering banking services, Santander is leading the fightback by launching a cloud storage service; but can it win? Our latest buyer's guide looks at cloud-optimised IT. And we examine how the economic trends will affect CIOs this year. Read the issue now.

  • How to Consolidate Application Portfolios

    Sponsored by: SearchCIO.com

    The business benefits of consolidating application portfolios make it a top priority for CIOs, but that doesn't mean it's easy to pull off. Read more in this SearchCIO handbook.

  • Why Every CIO Should Consider Vulnerability Assessment a Necessity

    Sponsored by: IBM

    In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.

  • Cloud Security: Enterprise Point of View

    Sponsored by: Dimension Data

    Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.

  • Profiting from big data

    Sponsored by: SearchCIO.com

    To successfully capitalize on big data, an iterative, experimental approach is essential to data-focused companies, and especially retailers, analysts say. Find out how several organizations leverage big data.

  • Driving Innovation and Agility Using Cloud Computing

    Sponsored by: Dell, Inc.

    Access this webcast to explore the effects of the cloud on today's organizations. You'll learn how the role of the CIO has evolved to focus on both innovation and information. You'll also get tips for selecting the right cloud broker and get insight into the rise of Cloud Service Catalogues and Brokers.

  • UKtech50: The most influential people in UK IT 2014 revealed

    Sponsored by: ComputerWeekly.com

    UKtech50 returned for its 5th year, showcasing the most influential people in UK IT and the rising stars in the industry. Read on to find out the top 50...

  • Computer Weekly – 9 December 2014: The most influential people in UK IT

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we unveil the 50 most influential people in UK IT for 2014, and interview the winner of our UKtech50 list, Unilever's global CIO, Jane Moran. We examine how Cisco is responding to software-defined networking. And we hear from IT chiefs successfully implementing identity and access management. Read the issue now.

  • CIO Decisions: Master Multichannel Customer Engagement

    Sponsored by: SearchCIO.com

    Unscrambling the multiple channels by which customers engage calls for close collaboration between CIOs and their business peers. Learn more about multichannel customer engagement strategy in CIO Decisions ezine.

  • Application Performance Management: It's all about keeping the App Happy

    Sponsored by: IBM

    Access this resource to get better insight into the importance of application performance management. You'll learn how you can leverage a dashboard that can quickly show you the issues that can cause downtime as they arise so you can quickly fix them, ensuring performance, availability, and user satisfaction.

  • Application Performance Management: It's all about keeping the App Happy

    Sponsored by: IBM

    Access this resource to get better insight into the importance of application performance management. You'll learn how you can leverage a dashboard that can quickly show you the issues that can cause downtime as they arise so you can quickly fix them, ensuring performance, availability, and user satisfaction.

  • How to Bring Shadow IT into the Light - 8 Steps Along the Path

    Sponsored by: Rackspace

    This white paper describes eight steps to help CIOs and other IT leaders to bring these potential risks to light. The key is to gain benefits from the cloud without risking your company's data.

  • 7 Tips on Becoming an IT Service Broker

    Sponsored by: Rackspace

    This white paper provides seven tips on how to make that transition with maximum effectiveness and minimal disruption to services.

  • The Benefits of ITSM Principles

    Sponsored by: CDW Corporation

    In this expert e-guide, examine the various benefits that an ITSM (IT service management) approach can provide an organization. Additionally, learn advice on how to integrate configuration management and IT asset management to optimize benefits and improve performance.

Browse by Report Type: CIOs White Papers | CIOs Multimedia | CIOs IT Downloads

See more topics related to: CIOs

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.