ComputerWeekly.com Research Library

Powered by Bitpipe.com

IT Governance Research

  • Infographic: 2021 APAC Media Consumption Study

    Sponsored by: ComputerWeekly.com

    In this infographic, we show the results of our 2021 Media Consumption Survey for APAC. Find out the impact of the pandemic on IT purchasing and the best marketing and sales approaches for prospect outreach on the new 'digital' normal.

  • IT Services Statement of Work Guide

    Sponsored by: ClearEdge

    Demand for IT Services and Systems Integrators is on the rise, and the Statement of Work (S.O.W.) used to define the services performed by these outside vendors can be critical to achieving a success. This guide helps you avoid mistakes in your IT Services S.O.W.

  • Building a SAM Program: Where to Start?

    Sponsored by: ClearEdge

    Research indicates 70+% of organizations do not have a formal SAM program. Yet studies also show rigorous SAM programs deliver up to 25% savings on software costs. But just adopting a SAM tool is not a silver bullet. View this webinar to learn how to succeed.

  • Top Gotchas in an IT Contract

    Sponsored by: ClearEdge

    In today's fast-paced environment of IT innovation, pressure to execute deals quickly can undermine your ROI due to traps hidden in contractual language in technology purchase agreements. This webinar discusses how to identify and mitigate these hidden time bombs before they bust your budget and derail your organization's goals.

  • IR35 reforms: Confusion over who pays employers’ NI leaves IT contractors out of pocket

    Sponsored by: ComputerWeekly.com

    Litigators are circling as thousands of contractors realise that the 2017 roll-out of IR35 reforms to the public sector may have resulted in unlawful tax deductions – and the private sector could be next.

  • Citizen Development In The Real World

    Sponsored by: ServiceNow

    Citizen development is a business process that enables employees without coding expertise to become software developers. Open up this article to learn more about how to bring citizen development onboard in the real world, and improve the employee experience in the process.

  • 2021 UKI Salary Survey Analysis Video

    Sponsored by: ComputerWeekly.com

    We take a look at our 2021 Salary Survey results from over 300 respondents who work in the UKI IT sector. We will be breaking down which job functions get paid what, what areas of IT companies will be investing in in 2021 and the current diversity landscape residing in the UK tech sector.

  • IR35 reforms: Confusion over who pays employers' NI leaves IT contractors out of pocket

    Sponsored by: ComputerWeekly.com

    Litigators are circling as thousands of contractors realise that the 2017 roll-out of IR35 reforms to the public sector may have resulted in unlawful tax deductions – and the private sector could be next.

  • Project Brief: Inside Juniper's radical IT transformation

    Sponsored by: ComputerWeekly.com

    Western Australian aged care provider Juniper embarked on an aggressive strategy to completely transform its IT operations in just two years. This 1-page brief summarises how this overhaul has helped free up the resources needed to provide better quality of care for residents.

  • Quantum computing in action

    Sponsored by: ComputerWeekly.com

    In this e-guide, we look at Finland and how state investment is being used in a milestone project involving public and private sector organisations to understand the applications of the technology. And we hear how Spanish bank BBVA is examining the complex financial problems that could be solved by quantum computing.

  • Making the business case for quantum computing

    Sponsored by: ComputerWeekly.com

    Tech startups, investors, major suppliers and even leading-edge companies are already placing a bet on the future of quantum computing. In this e-guide, we hear from experts in the tech sector, business consultancies and international corporations as they examine the potential of quantum computing.

  • An introduction to quantum computing

    Sponsored by: ComputerWeekly.com

    Quantum computing promises to revolutionise the capabilities of IT and take it to the next level beyond Moore's Law. But we're not there yet, and there is much to do before it reaches the mainstream. In this guide, we examine the challenges and opportunities of quantum computing.

  • 2021 UKI Salary Survey - Pandemic Infographic

    Sponsored by: ComputerWeekly.com

    We take a look at our 2021 Salary Survey results from over 300 respondents who work in the UKI IT sector. We will be breaking down which job functions get paid what, what areas of IT companies will be investing in in 2021, the current diversity landscape residing in the UK tech sector and how the pandemic has effected IT staff.

  • The future of IT is now

    Sponsored by: ServiceNow

    IT no longer merely supports commercial and organization growth – they are the primary driver. It’s up to IT to come up with digital transformation initiatives and move them forward. This whitepaper uncovers 9 ways to accelerate digital transformation in your organization, such as deploying AI and breaking down silos. Download now to learn more.

  • Modernize and automate ITAM across hardware, software, and cloud

    Sponsored by: ServiceNow

    Next-generation ITAM platforms are making it much easier to track hardware and software by offering a snapshot of IT assets to increase visibility and reduce risk. Download this white paper to see how a single system of action can help your organization drive down costs, reduce compliance risk and extend workflow intelligence across IT.

  • CW Benelux - February-April 2021: Is reluctance to report cyber crimes in the Netherlands helping the criminals to get away?

    Sponsored by: ComputerWeekly.com

    According to an academic study in the Netherlands, only one in seven Dutch people report a cyber crime to the police when it happens - feeling it is better to sort the problem out themselves because they don't think the police will do anything.

  • Chapter 15: Working with the Command-Line Interface

    Sponsored by: McGraw Hill

    Download this free chapter from ITF+ CompTIA IT Fundamentals to learn how to work with and decipher the command line interface, demonstrate fundamental commands and more.

  • Deloitte achieves new levels of productivity and client services through global standardization

    Sponsored by: ServiceNow

    In this case study, learn how Deloitte was able to unify inconsistent IT management approaches and streamline workflows with the help of ServiceNow.

  • The Five Challenges Of Modern It Operations

    Sponsored by: OpsRamp

    Check out this white paper to read about the 5 challenges of modern IT operations and discover the key features and capabilities of service-centric IT operations management from OpsRamp.

  • IT Operations Management Book of Knowledge

    Sponsored by: ServiceNow

    Inside this eBook, find a recap of ServiceNow’s IT operations management (ITOM) breakout sessions, thought leadership presentations, and customer speakers—all divulging industry-leading ITOM practices and strategies.

  • Achieving IT Asset Management Success

    Sponsored by: ServiceNow

    You’ve got to know exactly what software, hardware, and cloud infrastructure your business is made of. That’s where ITAM comes in. Save a copy of this eBook to learn just about everything there is to know about ITAM—at least, over 97 pages worth.

  • Future-Proofing Enterprise Security Awareness in the Age of Workforce Mobility

    Sponsored by: Barracuda

    With enterprises gearing towards a more mobile workforce, security awareness is now more important than ever – and the trends behind it are crucial for IT professionals. To get a sense of the readiness of organizations in employee awareness and training, read this Forrester report to explore these trends, as well as priorities, in this space.

  • Hidden Text and Zero Font Attacks

    Sponsored by: Inky Technology

    You may have heard that some phishing emails use something called zero font — text hidden in an email by various means. It is a brand forgery email intended to harvest login credentials. But what exactly is this technique, and why do attackers use it? Read this document to learn both the why and the how of hidden text and zero font.

  • CEO Impersonation

    Sponsored by: Inky Technology

    Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.

  • Project Brief: Inside Juniper's radical IT transformation

    Sponsored by: ComputerWeekly.com

    Western Australian aged care provider Juniper embarked on an aggressive strategy to completely transform its IT operations in just two years. This 1-page brief summarises how this overhaul has helped free up the resources needed to provide better quality of care for residents.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences