EGUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
RESEARCH CONTENT:
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
EGUIDE:
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
EZINE:
In this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.
RESOURCE:
This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
EZINE:
In this week's Computer Weekly, we visit the first hackathon at Abbey Road Studios, once home to The Beatles, to find out how tech startups hope to revolutionise music creation. Our latest buyer's guide looks at perimeterless network security. And we look ahead to the key CIO skills and jobs trends for 2019. Read the issue now.
EZINE:
In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.
EZINE:
In this week's Computer Weekly, VMware users are facing licence fee increases after the acquisition by Broadcom, with education bodies worst hit – we talk to unhappy customers. Read the issue now.
EGUIDE:
Software-defined WAN (SD-WAN) is taking over for traditional WAN, but not without taking a few lessons from its predecessor. Because of this, we have seen two significant trends in SD-WAN emerge; SD-WAN and WAN optimization techniques are merging and SD-WAN as a service. Access this e-guide for details.
EGUIDE:
In this expert e-guide, explore how organizations are adapting to the growing complexity of mobile app development with mobile backend as a service (MBaaS) platforms and a hybrid approach to cultivating mobile developer skills.