Controlled Vocabularies Reports

Computer Weekly - 18 May 2021: The real-life consequences of ransomware attacks
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.
Posted: 17 May 2021 | Published: 18 May 2021

TechTarget ComputerWeekly.com

Collaboration software in the era of Gen-Z
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, learn how Microsoft is dominating the Software-as-a-Service space thanks to its strength in collaboration software and how the new generation of collaboration software could be stoking communication overload. Also, check out our chart comparing Slack, Microsoft Teams and Spark.
Posted: 08 Feb 2021 | Published: 31 Aug 2018

TechTarget ComputerWeekly.com

Strategies to increase women in IT
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This special report from CEB offers some practical proven solutions to help IT leaders recruit and retain a better balance of employees.
Posted: 08 Feb 2021 | Published: 10 Oct 2016

TechTarget ComputerWeekly.com

Deloitte Global CIO Survey 2018 – UK Edition
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Fewer than 10% of CIOs identified themselves and their companies as being advanced in the journey to incorporate technology into their digital business strategies, Deloitte's 2018 CIO survey reveals in the UK edition of its 2018 global CIO survey, Manifesting Legacy: Looking Beyond the Digtal Era.
Posted: 08 Feb 2021 | Published: 29 Aug 2018

TechTarget ComputerWeekly.com

CIO and leadership survey 2017
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This survey of 80 CIOs and IT leaders by Coeus Consulting shows the technology and financial trends facing IT leaders and businesses.
Posted: 08 Feb 2021 | Published: 27 Jan 2017

TechTarget ComputerWeekly.com

How TDCX is building a people-centric business
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Every digital tool deployed by TDCX is aimed at augmenting the performance and experience of its employees. In an interview with CW, Byron Fernandez, group CIO of TDCX, talks up the company's approach in ensuring its technology investments enhance employee experience, as well as the cyber security challenges in its human capital intensive business.
Posted: 06 Jul 2022 | Published: 06 Jul 2022

TechTarget ComputerWeekly.com

Infographic: Bridging the Gap Between Business and IT
sponsored by IBM
WHITE PAPER: This infographic illustrates the necessity of integration between business and IT, as well as the fundamental disagreements that exist between the two groups.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

IBM

CW Europe – May 2014 Edition
sponsored by TechTarget ComputerWeekly.com
EZINE: Last year the European Union's 28 member states adopted guidelines for sharing basic clinical and administrative data on patients internationally, including the details of healthcare providers and insurers. This issue of CW Europe looks at how European Union (EU) countries vary in sharing patient records and exchanging data.
Posted: 01 May 2014 | Published: 01 May 2014

TechTarget ComputerWeekly.com

CW Europe – October 2014 Edition
sponsored by TechTarget ComputerWeekly.com
EZINE: BYOD policies: What's allowed and what's banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

TechTarget ComputerWeekly.com

Securing content and access with smart management techniques
sponsored by TechTarget Content Management
EBOOK: When it comes to ECM systems, the challenge for content management executives is to balance security with accessibility. To help with this task, here is a handbook of best practices – exploring topics on CMS security, IAM strategies, Office 365 and more.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

TechTarget Content Management