EZINE:
In this week's Computer Weekly, we talk to the leader of ExxonMobil's data organisation, about the energy giant's strategy to establish enterprise-wide principles for the use of data. As the UK's Online Safety Act comes into force, we examine the tech sector's concerns over the laws around end-to-end encryption. Read the issue now.
EGUIDE:
The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
EZINE:
In this week's Computer Weekly, with the EU General Data Protection Regulation (GDPR) coming in to force this year, we look at the challenges for businesses to comply by the 25 May deadline. We examine the future for HPE as CEO Meg Whitman steps down. And we find out how hyper-converged systems affect your backup strategy. Read the issue now.
EZINE:
In this edition of CW ANZ, we look at how enterprises in ANZ are approaching data management in the cloud, and some of the best practices that they can adopt to address cloud related challenges.
EZINE:
In this week's Computer Weekly, on the 50th anniversary of the Moon landings we look at the influence Apollo 11 had on modern hardware and software. Our latest buyer's guide examines data protection. And we find out how retailers with physical stores are using technology to respond to the rise of online shopping. Read the issue now.
WHITE PAPER:
This infographic illustrates the necessity of integration between business and IT, as well as the fundamental disagreements that exist between the two groups.
WHITE PAPER:
In this analysis, Frank Buytendijk examines what information management means, and describes a complete spectrum of business cases, ranging from tactical cost reduction to transformational impact on the organization’s business model.
WHITE PAPER:
In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.
WHITE PAPER:
This brief resource introduces an IT transformation consulting service as a means of achieving effective, value-driven change. Read on now to learn how you can ensure business and IT alignment, spur business growth, and more.