Information Technology Best Practices Reports

CW Benelux February 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
Posted: 08 Feb 2021 | Published: 01 Feb 2018

TechTarget ComputerWeekly.com

2020 IT Priorities UKI Infographic
sponsored by TechTarget ComputerWeekly.com
EBOOK: Each year, Computer Weekly asks CIOs and senior IT decision makers what they will be investing in during the 12 months ahead. Access this infographic to find out the key spending priorities for decision makers in the UK and Ireland in 2020.
Posted: 08 Feb 2021 | Published: 06 Apr 2020

TechTarget ComputerWeekly.com

Infographic: 2020 APAC Media Consumption Study
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic, we show the results of our 2020 Media Consumption Survey for the Asia-Pacific region. Find out who is part of the buying team and what do we know about the "final decision maker".
Posted: 08 Feb 2021 | Published: 18 Nov 2020

TechTarget ComputerWeekly.com

Infographic: Top 10 ways to improve Customer Experience
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As customer expectations increase, so does the need for excellent customer service and customer experience. There are many methods to improve CX - some complex and costly, others relatively simple and inexpensive. But how do you know what's right for you, and where do you start? Here are 10 initiatives you can use to improve customer experience.
Posted: 08 Feb 2021 | Published: 16 May 2019

TechTarget ComputerWeekly.com

Guide to building an enterprise API strategy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Today's businesses run on software, which must interoperate with myriad other software platforms. How can a business offer its data and computing capabilities to potential users without revealing the underlying source code? In this e-guide we explore the benefits of APIs, how to build an API strategy and why it is so important to have one in place.
Posted: 29 Nov 2022 | Published: 29 Nov 2022

TechTarget ComputerWeekly.com

CHAPTER 13: IT Troubleshooting
sponsored by McGraw Hill
BOOK: Download this sample chapter from ITF+ CompTIA IT Fundamentals to learn how to approach IT problems using a standard troubleshooting method, how to troubleshoot common computer problems and more.
Posted: 08 Feb 2021 | Published: 12 Jan 2021

McGraw Hill

CIO Trends #7: Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read about smart city initiatives in the Gulf Cooperation Council countries as well as why Saudi Arabia has sent a delegation to the bustling tech hub in the US - Silicon Valley. Also find out how a rare fault caused Visa's global payment system to go offline.
Posted: 08 Feb 2021 | Published: 23 Jul 2018

TechTarget ComputerWeekly.com

Infographic: 10 Culture hacks for CIOs driving organisational change
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic, we outline ten extremely simple culture hacks CIOs can use to drive organisational change and improve business outcomes. These tips were provided by Kristin Moyer, vice president and analyst at Gartner at the Gartner Symposium 2018.
Posted: 08 Feb 2021 | Published: 15 Nov 2018

TechTarget ComputerWeekly.com

CIO Trends #5: Benelux
sponsored by TechTarget ComputerWeekly.com
EGUIDE: After 17 years Dutch university TU Delft realized its learning management system, was no longer up to scratch it decided in the light of trends such as digital examination. Read about the project to replace one of its core legacy systems here.
Posted: 08 Feb 2021 | Published: 10 Jul 2017

TechTarget ComputerWeekly.com

Focus: Infosec17
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
Posted: 08 Feb 2021 | Published: 19 Jun 2017

TechTarget ComputerWeekly.com