EZINE:
In this week's Computer Weekly, we announce this year's list of the 50 most influential women in UK technology. We talk to Suki Fuller, who topped the list, about her journey in IT and the importance of diversity and inclusion. And we meet our rising stars – the women on a trajectory to influence the UK tech community. Read the issue now.
EZINE:
In this week's Computer Weekly, with Russian state cyber attacks in the news, we find out why security professionals in every organisation need to remain alert. Our buyer's guide looks at the tools and programmes helping improve IT training. And we look at how the traditional sport of golf is undergoing a digital transformation. Read the issue now.
EZINE:
Read in this issue how Philippine Long Distance Telephone Company (PLDT), has implemented a big data analytics environment, delivering invaluable behavioural insights for its capacity planning.
WHITE PAPER:
This paper discusses various technologies that can help IT managers plan and implement a more comprehensive and effective strategy for expanding data center capabilities while reducing power consumption.
EGUIDE:
In this expert tip, find out which certification programs are getting overhauled, including those focused on individual call center managers and agents, such as the program from ICMI, and the costs associated with these certifications.
WHITE PAPER:
Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access.
WHITE PAPER:
At the Computer Weekly diversity in tech event, experts proposed a 15-point plan to improve diversity and inclusion across the industry. Suggestions focused on getting people into the sector and keeping them there. Download the full report here.
WHITE PAPER:
Well-trained users are more productive and more successful in carrying out their roles. This whitepaper looks at what companies can do to build custom training and documentation.
EZINE:
Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
WHITE PAPER:
This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.