Computer Weekly – 2 August 2016: Giving fashion a digital makeover
EZINE:
In this week's Computer Weekly, we find out how one of the UK's biggest mail order retailers is moving to digital. We examine the growing importance of network function virtualisation. And a year after Microsoft turned Lync into Skype for Business, we assess how the unified communications product is faring. Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Aug 2016
|
|
Managing Android devices in the enterprise
EBOOK:
This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
Posted: 08 Feb 2021 | Published: 04 Aug 2016
|
|
CIO Trends #2
EGUIDE:
Computer Weekly talks to more IT leaders than any other publication, and our reporters gather in-depth insights into the challenges facing CIOs, CTOs and CDOs.
Posted: 08 Feb 2021 | Published: 03 Aug 2016
|
|
A Security Assessment of Android Full-disk Encryption
EGUIDE:
This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016
|
|
Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
ESSENTIAL GUIDE:
Cyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
Posted: 08 Feb 2021 | Published: 05 Aug 2016
|
|
Virtual currencies and their potential role in cyber crime
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.
Posted: 08 Feb 2021 | Published: 04 Aug 2016
|
|
CW@50: What was happening in IT in August over the years
ESSENTIAL GUIDE:
The National Museum of Computing has again been looking into Computer Weekly's 50 years of magazine issues for another selection of articles highlighting significant articles published in the month of August over the past five decades.
Posted: 08 Feb 2021 | Published: 03 Aug 2016
|
|
Computer Weekly – 26 July to 1 August 2016: Olympic vision: Technology on track for Rio Games
EZINE:
In this issue we interview the CIO for the forthcoming Rio Olympics. The technology his team has put in place will support delegations from over 200 countries, including 10,500 athletes. We also look at data centre and open source security, as well as take a first look at what the new UK Prime Minister's approach might be to the digital economy.
Posted: 08 Feb 2021 | Published: 26 Jul 2016
|
|
Computer Weekly – 19 July 2016
EZINE:
In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.
Posted: 08 Feb 2021 | Published: 19 Jul 2016
|
|
A Computer Weekly buyer's guide to NoSQL
EBOOK:
There's a lot of data out there, much of which doesn't need to be stored in heavyweight relational databases complete with complex query languages. In this 13-page buyer's guide, Computer Weekly looks at a new category of NoSQL data stores and how they are being used.
Posted: 08 Feb 2021 | Published: 28 Jul 2016
|
|
CIO Trends #2
EGUIDE:
Computer Weekly talks to more IT leaders than any other publication, and our reporters gather in-depth insights into the challenges facing CIOs, CTOs and CDOs.
Posted: 08 Feb 2021 | Published: 26 Jul 2016
|
|
Computer Weekly@50: What was happening in July
EBOOK:
The National Museum of Computing has again been looking into Computer Weekly's 50 years of magazine issues for another selection of articles highlighting significant news published in the month of July over the past five decades.
Posted: 08 Feb 2021 | Published: 19 Jul 2016
|
|
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
EGUIDE:
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 08 Feb 2021 | Published: 29 Jul 2016
|
|
Enterprise cloud applications – can we trust them?
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
Posted: 08 Feb 2021 | Published: 27 Jul 2016
|
|
A Computer Weekly buyer's guide to graph databases
EBOOK:
In this 14-page buyer's guide, Computer Weekly looks at the technology that teases out connections between divergent datasets – and how it is revolutionising data analysis.
Posted: 08 Feb 2021 | Published: 05 Jul 2016
|
|
Europe IT Priorities 2016
EGUIDE:
Every year, Computer Weekly and TechTarget conduct a global survey of our readers to understand their technology spending priorities for the coming 12 months. Our research offers a unique insight into the purchasing decisions of IT decision-makers worldwide.
Posted: 08 Feb 2021 | Published: 23 Jun 2016
|
|
Computer Weekly – 12 July 2016
EZINE:
In this issue we explore the many ways Watson has evolved from the machine that bettered humans in Jeopardy! to providing deep analytical insights to solve real world crises. We also look at how Barclay's bank is using DevOps to remain competitive and reveal new research that illustrates why cloud computing is at the heart of business innovation.
Posted: 08 Feb 2021 | Published: 12 Jul 2016
|
|
Middle East IT Priorities 2016
EGUIDE:
Computer Weekly's annual global survey of readers has once again revealed what CIOs around the world, including an increasing number of Middle East based IT leaders, are planning over the next 12 months.
Posted: 08 Feb 2021 | Published: 23 Jun 2016
|
|
CW Middle East July to Sept 2016
EZINE:
In this issue of CW Middle East we look at how CIOs in the region are formulating their virtualisation strategies as organisations warm to the benefits of cloud computing.
Posted: 08 Feb 2021 | Published: 18 Jul 2016
|
|
A Computer Weekly Buyer's Guide to Converged Infrastructure
EBOOK:
In this 13-page buyer's guide, Computer Weekly looks at how the technology cuts the numbers of discrete skills and associated costs while demanding that those who remain retrain to ensure they know how to manage all parts of the stack – and the organisation implements it with care and an understanding of the risks.
Posted: 08 Feb 2021 | Published: 24 May 2016
|
|
IT4IT for Managing the Business of IT
ESSENTIAL GUIDE:
IT4IT™ for Managing the Business of IT – A Management Guide, from The Open Group, provides best practice advice and focuses on the data and automated workflows needed to manage IT services in a lean, agile and business-focused way.
Posted: 08 Feb 2021 | Published: 26 May 2016
|
|
Mortimer Spinks and Computer Weekly Women in IT survey 2016
EBOOK:
The Mortimer Spinks and Computer Weekly Women in Technology Survey 2016 collected data between 16 March 2016 and 11 May 2016 and represents the views of 3,706 technology professionals across 75 countries.
Posted: 08 Feb 2021 | Published: 23 Jun 2016
|
|
CW@50: What was making the news in June
EGUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
Posted: 08 Feb 2021 | Published: 03 Jun 2016
|
|
UK IT Priorities 2016
EGUIDE:
Every year, Computer Weekly and TechTarget conduct a global survey of our readers to understand their technology spending priorities for the coming 12 months. Our research offers a unique insight into the purchasing decisions of IT decision-makers worldwide.
Posted: 08 Feb 2021 | Published: 23 Jun 2016
|
|
Cloud computing storage key management
ESSENTIAL GUIDE:
Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 08 Feb 2021 | Published: 04 May 2016
|