EZINE:
In this handbook, focused on enterprise resource planning in the Asia-Pacific region, Computer Weekly looks at what's behind this renewed priority and why firms want cheaper software maintenance and the benefits of best-of-breed cloud apps.
EZINE:
In this week's Computer Weekly, the BBC faces in-depth scrutiny over its digital plans β we take a look at progress. Do you need to keep data forever? We examine the technologies behind infinite storage. And we find out about the digital transformation challenges in vehicle dealerships. Read the issue now.
RESOURCE:
This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
EGUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
EGUIDE:
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
EGUIDE:
Open source used to be an alternative to commercial off βthe-shelf software. Today, the largest commercial software providers are big supporters of open source technologies.
EBOOK:
The way we work is changing with the exponential emergence of new technology. In this 15-page buyer's guide, Computer Weekly looks at the potential of DNA storage, how we can benefit from quantum computing in the future and the role of software in business development.
ESSENTIAL GUIDE:
Computer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything - this presentation was given by Steven Armstrong, principal automation engineer at Paddy Power Betfair.
EGUIDE:
Before you invest in data center infrastructure management (DCIM) tools, you need to know your needs and how to analyze whether a prospective tool will meet them. In this e-guide you will learn how to evaluate and compare DCIM software platforms based on key considerations.
WHITE PAPER:
Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.