Basel Capital Accord Reports

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos

Deloitte Global CIO Survey 2018 – UK Edition
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Fewer than 10% of CIOs identified themselves and their companies as being advanced in the journey to incorporate technology into their digital business strategies, Deloitte's 2018 CIO survey reveals in the UK edition of its 2018 global CIO survey, Manifesting Legacy: Looking Beyond the Digtal Era.
Posted: 08 Feb 2021 | Published: 29 Aug 2018

TechTarget ComputerWeekly.com

Computer Weekly – 19 December 2017: Navigating through digital change
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, IT leaders share the lessons learned and discuss best practice in digital transformation. We find out how SAP is addressing customer concerns about its indirect licensing policies. And we assess whether SME IT suppliers are making headway in selling to government CIOs. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Dec 2017

TechTarget ComputerWeekly.com

CIO Trends #3
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This guide offers a collection of our most popular articles for IT leaders during the last part of 2016, looking at what it takes to be a great CIO and how to get the most out of your IT budget.
Posted: 08 Feb 2021 | Published: 12 Dec 2016

TechTarget ComputerWeekly.com

Financial applications automation – promise is real but needs business nous
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The automation of the financial software that lies at the heart of any business – accountancy, budget management, general ledger, payroll, and so on – is a prize many organisations are eyeing up, with machine learning and robotic process automation close to mind. Find out everything you need to know by downloading this PDF E-Guide.
Posted: 08 Feb 2021 | Published: 15 Jan 2021

TechTarget ComputerWeekly.com

Digital Transformation: Part I
sponsored by TechTarget ComputerWeekly.com
PRESENTATION: In this presentation from our CW500 event, director of digital architecture and transformation Chris Boyd explains how Telefonica tackled the challenges of delivering people, cultural and organisational change.
Posted: 08 Feb 2021 | Published: 17 Mar 2016

TechTarget ComputerWeekly.com

Collaboration software in the era of Gen-Z
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, learn how Microsoft is dominating the Software-as-a-Service space thanks to its strength in collaboration software and how the new generation of collaboration software could be stoking communication overload. Also, check out our chart comparing Slack, Microsoft Teams and Spark.
Posted: 08 Feb 2021 | Published: 31 Aug 2018

TechTarget ComputerWeekly.com

Transforming Into Senior Digital Business Executives
sponsored by Gartner
WEBCAST: Tune in to this informative webcast to learn how you can make the most out of your role as CIO or IT manager and refocus your efforts on adding real business value to you enterprise. Click on the link and stream this informative webcast from the experts at Gartner to find out more.
Posted: 03 Jul 2014 | Premiered: Jul 3, 2014

Gartner

Health and Beauty Company Manages 2,000 Transactions per Minute
sponsored by Delego
CASE STUDY: Access this case study to find out how this $3 billion a year company found a platform that helps securely manage large volumes of transactions without hesitation.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Delego

CW Europe – October 2014 Edition
sponsored by TechTarget ComputerWeekly.com
EZINE: BYOD policies: What's allowed and what's banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

TechTarget ComputerWeekly.com