All Research Sponsored By:TechTarget ComputerWeekly.com

First edition of Computer Weekly 1966
EBOOK: To celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.
Posted: 08 Feb 2021 | Published: 09 Sep 2016


A Computer Weekly buyer's guide to operational IT
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at applying back-office IT to industrial machines, how businesses can further digitise their operations, and how best to tap into data held in mainframes.
Posted: 08 Feb 2021 | Published: 30 Aug 2016


A case study in critical infrastructure interdependency
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series provides a short introduction to Critical Infrastructure Protection.
Posted: 08 Feb 2021 | Published: 02 Sep 2016


Computer Weekly – 30 August 2016: Get protected
EZINE: It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.
Posted: 08 Feb 2021 | Published: 30 Aug 2016


BadUSB 2.0: Exploring USB man-in-the-middle attacks
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
Posted: 08 Feb 2021 | Published: 30 Aug 2016


Information technology skills guide
ESSENTIAL GUIDE: Author and IT consultant, Terry Critchley, looks at potential solutions to the apparent skills crisis facing the IT industry, in this special guide for Computer Weekly.
Posted: 08 Feb 2021 | Published: 26 Aug 2016


IT Project: Internet of Things
EGUIDE: The internet of things, or IoT, is moving from far-fetched to reality in 2016, and more and more enterprises are taking a serious look at how they can capitalise on this to improve their processes.
Posted: 08 Feb 2021 | Published: 19 Aug 2016


CIO Trends #2: Nordics
EGUIDE: Computer Weekly talks to more IT leaders than any other publication, and our reporters gather in-depth insights into the challenges facing CIOs, CTOs and CDOs. This guide offers a collection of our most popular articles for IT leaders,
Posted: 08 Feb 2021 | Published: 25 Aug 2016


All-Flash: The Essential Guide
EGUIDE: This guide offers a comprehensive survey of the all-flash array market. We look at all-flash products from the big six storage vendors and the startups and specialists. Plus, we give the lowdown on all-flash vs hybrid flash arrays and all-flash vs server-side PCIe SSD.
Posted: 08 Feb 2021 | Published: 19 Aug 2016


CW Benelux ezine August 2016
EZINE: In this issue of CW Benelux we describe how data scientists in the Netherlands have applied technology to art.
Posted: 08 Feb 2021 | Published: 15 Aug 2016


IT Project: Migration to cloud
EGUIDE: The benefits of using cloud are well-known, but the challenges and barriers enterprises come up against during their move off-premise can be wide, varied and unexpected. Knowing how best to negotiate these issues can help speed up the process of shifting workloads and applications to the cloud immeasurably.
Posted: 08 Feb 2021 | Published: 17 Aug 2016


The future of enterprise IT: Social, mobile, analytics and cloud
EGUIDE: Mobile and data technologies are allowing organisations to provide service levels not even dreamt of a few years ago. This guide looks at some examples of these technologies transforming organisations in Australia.
Posted: 08 Feb 2021 | Published: 15 Aug 2016


Extracting actionable data from banking malware
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
Posted: 08 Feb 2021 | Published: 17 Aug 2016


What does cloud computing look like in 2016?
EGUIDE: Cloud computing today is in a phase of rapid take-up. Technology as a service is a top priority for CIOs in Southeast Asia.This guide gives examples of how cloud computing is being harnessed within the region.
Posted: 08 Feb 2021 | Published: 15 Aug 2016


The future of enterprise IT: Social, social, mobile, analytics and cloud
EGUIDE: Cloud and data technologies are allowing organizations to provide service levels not even dreamt of a few years ago. This guide looks at some examples of these technologies transforming organizations in South-East Asia.
Posted: 08 Feb 2021 | Published: 15 Aug 2016


IT Project: DevOps
EGUIDE: 2016 is widely tipped to be the year DevOps goes mainstream, with enterprise IT managers either looking to ramp up or kick-start their efforts in this area, and start realising the benefits it can bring.
Posted: 08 Feb 2021 | Published: 18 Aug 2016


Computer Weekly – 16 August 2016: Barriers to UK datacentre expansion
EZINE: A TechUK survey has found that the UK tech sector's confidence of growth over the next two years has dropped by 23 points, due to Brexit. In this week's issue, we look at how Asian investors are pulling out of datacentre investments. According to datacentre analyst Broadgroup, these investors have been quite spooked by the Brexit vote.
Posted: 08 Feb 2021 | Published: 16 Aug 2016


A Computer Weekly buyer's guide to expense management
EBOOK: Every year, UK businesses deal with about £10bn in expenses claims, but surprisingly few use IT to manage that spend. In this 12-page buyer's guide, Computer Weekly looks at how the application of expense management tools can reward organisations with immediate cost and time savings
Posted: 08 Feb 2021 | Published: 09 Aug 2016


Computer Weekly – 9 August 2016: Will Rio's 4G sink or swim?
EZINE: The Rio Olympic games are meant to be the fastest Games ever – not just for the athletes, but also for mobile data speeds. Users will want to upload photos and videos in real time. In this week's Computer Weekly, we investigate how operators are working round Brazil's patchy 4G. We also find out how Glasgow's smart city initiatives are evolving.
Posted: 08 Feb 2021 | Published: 09 Aug 2016


Understanding behavioural detection of antivirus
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.
Posted: 08 Feb 2021 | Published: 12 Aug 2016


CW Nordics August 2016
EBOOK: The Nordic countries are renowned for being home to thriving tech startup scenes so it is hardly surprising that IT is a disruptive force in the region.
Posted: 08 Feb 2021 | Published: 10 Aug 2016


A Security Assessment of Android Full-disk Encryption
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016


Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
ESSENTIAL GUIDE: Cyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
Posted: 08 Feb 2021 | Published: 05 Aug 2016


Virtual currencies and their potential role in cyber crime
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.
Posted: 08 Feb 2021 | Published: 04 Aug 2016


CW@50: What was happening in IT in August over the years
ESSENTIAL GUIDE: The National Museum of Computing has again been looking into Computer Weekly's 50 years of magazine issues for another selection of articles highlighting significant articles published in the month of August over the past five decades.
Posted: 08 Feb 2021 | Published: 03 Aug 2016