PRODUCT OVERVIEW:
Access this resource to learn how to convert old 5350 screens to modern GUI formats in a few easy steps with limited personnel, positioning your organization for further enhancements. Discover a cost-effective path that minimizes your personnel resources without the pain of other conversion technologies.
WHITE PAPER:
Refactoring legacy applications on the System i into modern architecture is the biggest challenge in business software today. Read this white paper to get the information necessary to achieving this strategic objective.
EGUIDE:
Adopting a microservices approach to application development is increasingly considered an essential part of any bid to modernise the legacy IT setup an organisation relies on.
EBOOK:
To celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.
EZINE:
In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
EZINE:
In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
EZINE:
In this week's Computer Weekly, we talk to the BBC about how the UK broadcaster is using data analytics to better understand its viewers and grow its audience. We look at how CERN is using IT automation in its quest to unravel the mysteries of the universe. And we examine the impact of GDPR on cloud storage. Read the issue now.
EGUIDE:
Blockchain deployments are rapidly becoming mainstream. Nearly 40% of respondents' companies are deploying blockchain technology, rising to 57% amongst companies with over 20,000 employees. In part, this is due to increased awareness and understanding of what blockchain entails, particularly at Founder/CEO level.
EGUIDE:
The buzz and hype surrounding container technologies has reached fever pitch in recent years, prompting CIOs and IT decision makers to mull over what role, if any, they should and could play in their digital transformation plans.
EGUIDE:
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.