PRESENTATION:
A look forward to the 12 months ahead for IT leaders and the key trends of the coming year - this presentation came from Spencer Izard, chief analyst in the enterprise advisory team at Ovum, discussing the major technology trends for this year.
ESSENTIAL GUIDE:
This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
EZINE:
In this week's Computer Weekly, we look back at the UK government's AI Safety Summit and assess what it achieved – and what it didn't. Our latest buyer's guide examines the future of business software and modernising legacy applications. And we find out how the UK PSTI Act aims to protect your smart devices. Read the issue now.
EZINE:
In this week's Computer Weekly, we examine the European Parliament's digital vision for the next decade, including controversial plans for a regional internet. GDPR is two years old – we find out how well the law is working. And we look at how the coronavirus crisis is affecting digital skills recruitment and training.
EBOOK:
Now more than ever, HR professionals are tasked with optimizing performance management processes across the board, so they can ensure the most efficient use of corporate resources. Performance management will lead a company toward better engaging, retaining, and developing its most valuable asset: the workforce.
PRESENTATION TRANSCRIPT:
The weakening economy and turmoil in the U.S. financial system have left employees uneasy in workplaces across the country, this paper explains the ways to increase your team's productivity during these lean times.
CASE STUDY:
In this paper you'll read about the steps Wipro Technologies took in order to take its brand name to the next level in order to compete with the top global IT companies.
WHITE PAPER:
Are you sitting on your data with no plan? Do you know how to capitalize on information you already have? This whitepaper dives into the world of profiting from data. Access now to discover 4 essential steps to getting started, as well as challenges to overcome and a discussion on the importance of data integrity.
EBOOK:
Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.