DATA SHEET:
The Computer Weekly Innovation Awards APAC 2024 will once again shine the spotlight on digital transformation projects that have delivered business impact and/or solved problems using innovative approaches. All entries will be assessed by an independent panel of judges. Download your nomination form here.
EZINE:
In this week's Computer Weekly, we talk to the leader of ExxonMobil's data organisation, about the energy giant's strategy to establish enterprise-wide principles for the use of data. As the UK's Online Safety Act comes into force, we examine the tech sector's concerns over the laws around end-to-end encryption. Read the issue now.
EZINE:
In this week's Computer Weekly, we find out how brewing giant Heineken is building a data ecosystem to share insights and tap into AI capabilities. The UK is conducting an investigation into cloud supplier dominance – what will it mean for users? And we examine how generative AI could be used to improve customer experience. Read the issue now.
EBOOK:
In this automation architect’s guiding e-book, discover a walkthrough map of the steps required to lead your organization beyond task-centric automation toward an enterprise-wide strategy.
WHITE PAPER:
HR and business leaders must adapt to the changing landscape and invest in modern approaches and technology to foster sustainable and systematic employee development. This paper explores four key trends that can help future-proof your workforce.
EGUIDE:
The better the working conditions of a software developer, the better the results. In this 15-page buyer’s guide, Computer Weekly looks at how to improve productivity, the tools required to build success and the value of in-house expertise.
WEBCAST:
Watch this webinar to hear from a panel of experts from IDC, Google Cloud, and partners discuss how they are putting data, analytics, and the power of artificial intelligence to work via the cloud.
WHITE PAPER:
Understanding where your organization stands in the Identity Security Maturity Model can help you identify gaps and plan for improvement in your Identity Security strategy. Read this paper to learn more and find your place in the model.