Computer Weekly Buyer's Guide feature list 2022

0
342
Oracle enhances customer experience platform with a B2B refresh

Source is ComputerWeekly.com

Computer Weekly Buyer’s Guides map the IT buying cycle of our readership onto relevant editorial that will inform and educate readers and help them in making the right buying decision.

On a three-week cycle, the publication runs a series of articles focused on a particular category of software/hardware/IT service. Articles appear in the features section of the Computer Weekly ezine, which can be downloaded as a PDF or viewed as an SEO-optimised Buyer’s Guide page on the Computer Weekly website.

The Buyer’s Guide PDF downloads point readers to the online Buyer’s Guide, where they will be able to access all the articles in one place, along with additional content, such as blog posts and related articles.

The editorial team updates the Buyer’s Guide schedule on a quarterly basis to ensure the chosen technologies are topical and to respond to short-term commercial opportunities.

Buyer’s Guides comprise three separate features, which combine to become a standalone piece of evergreen content that readers can refer back to.

Each part includes a written article, plus relevant background material, as well as exclusive online-only multimedia content and infographics.

The proposed schedule for H1 2022 is as follows:

Hybrid cloud storage

Jan 11 – Jan 31

Whether it is to meet regulatory compliance or to support applications that need to have processing as close as possible to where data is collected and stored, many IT leaders believe their storage needs will be met through a hybrid approach using public cloud and on-premise systems.  We explore the business drivers and architectural decisions that go into hybrid cloud storage.

Data integration

Feb 01 – Feb 21

The most successful organisations are the ones that can pull together internal, external and real time data sources to make decisions in a timely fashion to achieve a positive business outcome. We look at how businesses solve their data integration challenges.

Training and education programmes/tools

Feb 22 – Mar 14

In-house or outsourced? What makes a good training programme, and what questions should buyers ask when procuring training-as-a-service?

Cloud enterprise applications

Mar 15 – Apr 4

In this series of articles we investigate how organisations use best of breed software as a service products to fill gaps in their enterprise application strategy and deliver a modern approach to ERP.

Edge datacentres

Apr 5 – 02 May

The public cloud has led to a shift away from centralised datacentre computing. But while organisations may wish to focus on cloud-native and cloud-first strategies, many need to put workloads at the edge. We discuss how edge datacentres work in cloud-native businesses.

Communications-as-a-service

May 03 – May 23

To gain a business edge, organisations are increasingly integrating voice, video, chat and messaging as consumption-based services, which can be deployed on-prem or in the cloud. From a management perspective, these services aim to deliver measurable enhanced communications experiences for customers and employees. There is also the new trend of firms bringing non-person communication from sources such as M2M and IOT managed delivered on a CaaS basis. We look at how these services are being used.

The circular economy

May 24 – Jun 13

Given that among the roles of IT admins is to manage the lifecycle of equipment, they are  well placed to provide the data needed to recycle equipment via the circular economy. We explore how businesses are using the circular economy for IT equipment to reduce their carbon footprint.

Supply chain security

Jun 14 – Jul 04

In a highly connected world, businesses try to streamline the connectivity between business partners. These connections are only as secure as the weakest link. Increasingly, hackers are targeting these weaknesses to attack major corporations.

Source is ComputerWeekly.com

Vorig artikelAccenture to create 3,000 UK tech jobs
Volgend artikelRecovering from ransomware: One organisation’s inside story