EGUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
EZINE:
In this handbook, focused on enterprise resource planning in the Asia-Pacific region, Computer Weekly looks at what's behind this renewed priority and why firms want cheaper software maintenance and the benefits of best-of-breed cloud apps.
EZINE:
In this week's Computer Weekly, we talk to snack giant Mondelez, the owner of Cadbury, about how AI and data are transforming its business. SAP is increasing support costs for the first time in years – we assess the impact on customers. And a Ukrainian tech CEO tells us how his company kept going despite the Russian invasion. Read the issue now.
EZINE:
In this week's Computer Weekly, we find out how the Met Office is using its vast stores of weather data to create innovative new products. Our latest buyer's guide looks into identity and access management systems. And we examine the geopolitical threats that could curb the openness of open source. Read the issue now.
ANALYST REPORT:
The dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
EZINE:
We search back through the Computer Weekly archives held at The National Museum of Computing to present what was happening in IT over the past five decades.
EGUIDE:
Open source used to be an alternative to commercial off –the-shelf software. Today, the largest commercial software providers are big supporters of open source technologies.
BROCHURE:
This brochure shows how you can be a superhero by making WebSphere MQ the messaging backbone for your SOA, creating a common connection for the free flow of information.
WHITE PAPER:
This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.