You've requested...

SPM - Beyond Commission: Ahead of the SPM Maturity Curve

If a new window did not open, click here to view this asset.

Download this next:

AI proves value in HR, but handle with care

Artificial Intelligence could be, and often is, seen as a bogeyman in HR. The infamous Amazon case, widely reported in 2018, where a recruitment algorithm decided not to consider women candidates because of their gender, basing itself on past data, is a byword for how things can go wrong with AI in HR.

But AI is also proving its value for HR. The Amazon debacle, which came to light in 2015, leading to the termination of that specific project in 2017, has not stopped companies using AI to standardise recruitment. And Amazon said it had never used the rogue algorithm for real, in any case.

The increasing prominence of AI, and other digital technologies, means that organisations are also being forced to re-skill the workforces they have recruited and retained. Even CIOs will need to up their game to stay relevant, we find.

And, contrary to popular common wisdom that AI is bound to be on the side of the bosses and against the workers, we also see, in this e-guide, how the allocation of work by algorithm might have advantages for workers as well as employers, even in the so-called “gig economy”.

Moreover, there is more to advanced HR software use than AI. In this e-guide we see it being used, in richly detailed case studies, at a strategic level by a trio of companies: at the merged Standard Life and Aberdeen Asset Management, The Gym Group, using data analytics to support expansion , and Agfa-Gevaert, to effect a spin-off.

These are also closely related to: "SPM - Beyond Commission: Ahead of the SPM Maturity Curve"

  • Backup monitoring: Building a better client experience

    In the relationship between MSPs and clients, trust is paramount. That’s why backups, which are vital for disaster recovery, are crucial to get right. One bad experience is all it takes for clients to seek out a new MSP.

    Fortunately, by prioritizing backup service and enabling proper backup monitoring, MSPs can deliver the level of security needed to build long-lasting relationships with their clients.

    Read on to discover how greater backup reliability can lead to an improved client experience and better business performance.

  • Managing Integrated Communications, Consumerization and Security: Best Practices

    Integrated communications are changing the way enterprises script communications strategies – especially as new technologies and applications are mixed in with existing ones. And as organizations try to integrate these new technologies with old, they are faced with doing so under fierce budget cuts and – even more troubling – with the attention of many execs focused on compliance, consumerization, and security.

    This E-Guide from SearchUnifiedCommunications.com explores the necessity of integrated communications and the effect they will have on your organization. View now to uncover best practices to tackling the challenges you are likely to face and how to best meet the needs of integrated communication.

Find more content like what you just read:

  • Computer Weekly datacentre case studies

    Jim Mortleman takes a look at what made the winning entries stand out from the crowd in the Computer Weekly European User Awards.

    Download

  • Analyst report: How finance teams can manage digital growth

    Given that digital transformation is evolving at a dizzying pace, and that such transformation drives new customer preferences, businesses must adapt to remain competitive. This Aberdeen Strategy and Research report zeroes in on how finance teams are meeting that challenge. Read on to learn from their experiences.

    Download

  • SIP contact centers: Key benefits and potential challenges

    Learn how Session Initiation Protocol (SIP), unified communications (UC) and contact centers fit hand in hand in this e-guide from SearchUnifiedCommunications.com.

    Download

  • Computer Weekly - 17 December 2019: How data analytics is improving the world's greatest tennis players

    In this week's Computer Weekly, we talk to the organisation that runs men's tennis worldwide to find out how data analytics is transforming the sport. Intel processors delays will affect Windows 10 upgrades – we examine the implications. And we ask if AI is living up to the hype in enterprise IT. Read the issue now.

    Download

  • Data Management Strategies for the CIO

    CIOs are turning to emerging forms of data management, including predictive business intelligence and information architectures, to harness the power of their data. Inside this expert e-book, gain insight on data management topics such as storage and retention policies, data protection and lifecycle management.

    Download

  • Fighting ransomware: Why good luck won’t help you

    Download this e-book for the Insider’s Guide to Defending Against Ransomware, so you can evaluate the real risks, costs, and strategies for IT leaders.

    Download

  • Top 10 business applications stories of 2019

    The steady incursion of artificial intelligence (AI) into enterprise software was a major theme behind Computer Weekly's indepth stories in this area in 2019. Human versus machine is the opposition that looms over much of the coverage here. Here are Computer Weekly's top 10 business applications stories of 2019.

    Download

  • Time and Attendance Software Best Practices

    In this informative e-guide, discover insights on time and attendance software best practices.

    Download

  • E-Book: Technical Guide on PCI

    TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance.

    Download

  • Upgrading to 802.11n

    This E-Guide identifies key questions that enterprise customers should ask prospective WLAN vendors and also provides a list of vendors that will suit the needs specific to your business.

    Download

  • Put Purchase Intent Data to Work for You

    Simply adopting a CRM system doesn’t guarantee better customer relationships. The data you put into the system matters. In this e-book, Patricia Anton, founder of Anton Consulting, Inc. discusses how you can bring together data, human processes and technology to create a competitive advantage.

    Download

  • Modern Mainframe Management Challenges E-Book: Running New Workloads like Linux

    Access this e-book to learn the best ways to use mainframes for running new workloads such as those associated with the Linux operating system and assess the TCO evidence that the mainframe can now be a low-cost platform for workloads.

    Download

  • CW Buyers Guide: Green IT

    This six-page Buyer’s Guide to Green IT helps CIOs and senior IT professionals to identify the issues around going green and explains the pros and cons of using third-party facilities to run IT services.

    Download

  • How to enhance your network for the future

    The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.

    Download

  • How virtual desktops simply end user computing during lockdown

    While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.

    Download

  • CIO Trends #7

    Read some of our most popular articles on issues faced by IT decision makers, such as how to get the most out of the internet of things, and how to tailor your IT operating model to fit in the digital age.

    Download

  • Running New Workloads Like Linux

    This expert e-book explores the changes to mainframes in the past ten years. Discover how your organization can lower TCO and achieve other benefits by moving workloads to the mainframe.

    Download

  • Business analytics needs underpinnings of sound data and data-skilled humans

    Data analytics for the solution of first-order business problems is probably more important than ever. It is not new. Companies and organisations have been analysing computerised data for many decades. But all sorts of companies now pronounce themselves "data driven". Read more about business analytics trends in this exclusive e-guide.

    Download

  • Predictive analytics gains evermore accuracy in guiding enterprises forward

    Predictive analytics can help businesses look for meaningful patterns in data, then build models that forecast what is likely to happen in the future.

    Download

  • Focus: IT Security in the Middle East

    In this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.

    Download

  • Private Cloud E-Zine Vol. 4

    As cloud continues to evolve, IT managers are looking for better integration of cloud platforms with existing tools, greater control and management, improved self-service and greater portability among cloud environments. This e-zine takes a look at trends in cloud computing, using open source software, moving applications to the cloud.

    Download

  • Windows vs. Android: Which is better for your meeting needs?

    In order to make communications tools on cloud platforms operate easier, many organizations have meeting room software compatible with third-party hardware running Windows and Android. Because of this, many don’t know which to adopt. Access this guide to learn the pros and cons of both Windows and Android and see which is right for you.

    Download

  • Technical Guide on Emerging Threats

    It takes time and money to adjust IT security in response to evolving attack tactics. As defenders gradually update their security measures, attackers respond accordingly. Such arms-race dynamics lead to threats of increasing sophistication and efficiency.

    Download

  • Computer Weekly – 21 May 2019: Managing software updates in Windows 10

    In this week's Computer Weekly, we find out how technology is fighting poverty by increasing financial inclusion. We examine how best to manage the challenges of Microsoft's new plan for ongoing Windows 10 updates. And we find out how data innovation at Lloyd's of London is supporting a wider digital modernisation. Read the issue now.

    Download

  • Fail to prepare quality data, prepare to fail

    Fail to prepare, prepare to fail is an adage that never fails to lose its veracity. The same is true of using poor quality data, known to be the bane of the lives of data analysts, not to speak of organisations that yearn to be "data driven".

    Download

  • A Computer Weekly buyer's guide to data quality

    The value of data depends on its quality. In this 14-page buyer's guide, Computer Weekly looks at how the coronavirus pandemic has highlighted the challenges of inaccurate datasets, the new analytics techniques improving data quality and Informa's use of Collibra software

    Download

  • Mobile application platforms: Essential guide

    One of the mantras of modern enterprise application development is that business applications should be as easy to use as mass market consumer applications. Increasingly apps must be one step ahead of the user, pulling in context-specific information and providing a seamless user experience.

    Download

  • Can a tiny, wearable device help prevent HAPIs and become the new standard of care?

    In a meta-analysis of clinical studies, the LEAF Patient Monitoring System, compared with standard of care, resulted in a 94% reduction in the risk of pressure injury among 3,935 acutely ill hospitalized or nursing home patients. Relying on traditional, manual turn reminders should no longer be considered standard care.

    Download

  • Exchange Insider E-Zine vol. 11: Office 365, mobile devices, Exchange security

    In this edition of the Exchange Insider E-Zine, explore how to migrate to Office 365, support mobile devices and protect your Exchange Server environment from the latest threats.

    Download

  • CW ASEAN: Connect your people

    Unified collaboration (UC) is transforming the way business is done globally. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises are embracing UC tools, factors that organizations should consider when developing a UC strategy, and the emergence of startups that have been shaking up the marketplace.

    Download

  • How you can maximize your employee’s lifetime value

    When it comes to the employee lifecycle that starts with being hired to their last day, it’s important to ensure the employee is delivering value throughout their tenure. To achieve this, it all starts with the People, or HR team. With the right people practices, it’s easy to keep your employees productive and engaged. Read on to learn more.

    Download

  • Meeting the demands of modern data management

    Today’s organizations are in possession of more data than ever before, necessitating new means of storing, organizing, and utilizing data. This product overview looks at Panzura CloudFS, a global file system purpose-built to meet the challenges of modern data management. Read on to learn more.

    Download

  • Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?

    In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.

    Download

  • Definitive Guide to Exchange Server 2010 Migration: Chapter 1: Under the Hood of Exchange Server 2010

    Migrating to Exchange Server 2010 from the 2007 edition is becoming a must, as the 2010 edition offers improved email archiving, high-availability, and optimal storage features. But as you begin to explore the possibilities of upgrading to Exchange 2010, do you have a proper plan in place?

    Download

  • Enterprise Device Management: A Brave New World

    Learn how implementing a strong mobile device management solution can help you avoid security risks and compliance violations while allowing access by your users personal devices.

    Download

  • MicroScope – September 2022: The green agenda

    Sustainability is now seen as a necessity for business to have on their agenda, so read about how the channel is turning green to capture customer attention. Also discover how the pandemic has changed sales forever and boosted the importance of relationships, as well as learn about how to handle currency fluctuations, rises and inflation.

    Download

  • Threat management: Essential guide

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

    Download

  • 2021 UKI Salary Survey Results

    In this e-guide: We take a look at our 2021 Salary Survey results from over 300 respondents who work in the UKI IT sector. We will be breaking down which job functions get paid what, what areas of IT companies will be investing in in 2021 and the current diversity landscape residing in the UK tech sector.

    Download

  • Best practices for introducing tablets in your enterprise

    There is a lot of hype around tablets, but many companies are still weighing their benefits. This expert e-guide explores the top reasons businesses should consider these devices and offers advice for keeping them secure once they have been implemented.

    Download

  • Exchange Migration E-Book Chapter 2: Mastering the Art of Migration Documentation

    This sample chapter explains how to draft a useful migration document and outlines key points your Exchange Server upgrade document should include, such as management strategies, storage design, software compatibility and more.

    Download

  • Keeping up to Date with your Organization's Threat and Authentication Techniques

    Enterprises must have an understanding around two main topics when looking to protect their organizations. This expert e-guide explores the allure of risk-based authentication and how to make access easy for your clients while still make sure their data is secure.

    Download

  • Enterprise-wide collaboration: Make your case

    Access this expert e-book for tips on effectively implementing SharePoint with your organization's collaboration technology.

    Download

  • How Australian organisations are coping with big data storage challenges

    In this e-guide, read about how Australian organisations are coping with the storage challenges of big data, why flash storage is still too expensive for some companies and how NetApp is evolving to keep up with changes in the industry.

    Download

  • Computer Weekly Buyer's Guide to EU General Data Protection Regulation

    In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.

    Download

  • Focus: Securing new technology

    The scarcity of information security professionals with the required depth and breadth of experience is one of the biggest challenges facing businesses. As businesses seek to gain competitive edge through digital transformation, they are increasingly exposing themselves to increasing risk of cyber attack.

    Download

  • Step-by-step Guide to Migrating from Exchange 2003 to Exchange 2010

    While Exchange 2010 promises to offer enhanced communication and collaboration capabilities, the migration process can still be a challenge for even the most diligent IT professional. Take a look at this e-book from the editors at SearchExchange.com for a top-to-bottom, expert analysis of the Exchange migration process.

    Download

  • Cyber security in the Middle East

    As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.

    Download