API Management: The role of APis in digital business transformation
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.
Posted: 08 Feb 2021 | Published: 09 Nov 2020
|
|
|
CW500: A roadmap to software-defined everything – Morgan Stanley
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Computer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything – this presentation was given by Rob White, executive director of the global database group at Morgan Stanley.
Posted: 08 Feb 2021 | Published: 14 Oct 2016
|
|
|
Computer Weekly - 29 November 2022: How to stop data retention from killing the planet
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.
Posted: 28 Nov 2022 | Published: 29 Nov 2022
|
|
|
Computer Weekly – 26 February 2019: Delving into viewer data at the BBC
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to the BBC about how the UK broadcaster is using data analytics to better understand its viewers and grow its audience. We look at how CERN is using IT automation in its quest to unravel the mysteries of the universe. And we examine the impact of GDPR on cloud storage. Read the issue now.
Posted: 08 Feb 2021 | Published: 22 Feb 2019
|
|
|
Computer Weekly - 3 August 2021: The fears and benefits of virtualising reality
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the mingling of virtual and physical worlds and find positive applications and worrisome implications from augmented reality. We find out how to run a virtual hackathon during the pandemic – pizza still included. And we look at how to improve performance of your private cloud. Read the issue now.
Posted: 01 Aug 2021 | Published: 03 Aug 2021
|
|
|
Enterprise cloud applications – can we trust them?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
Posted: 08 Feb 2021 | Published: 27 Jul 2016
|
|
|
Application Modernisation: The Essential Guide
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
In this guide, we look at how distributed systems have evolved to support more agile software development.
Posted: 08 Feb 2021 | Published: 27 Sep 2016
|
|
|
Computer Weekly – 29 January 2019: A vintage digital transformation for Majestic Wines
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the digital transformation of retailer Majestic Wines and find out how buying rival Naked Wines led to a cloud overhaul of the firm's IT. We look at the challenges for IT managers as they prepare for the end of Windows 7 support. And our buyer's guide discusses deep learning technology. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Jan 2019
|
|
|
Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER:
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008
|
|
|
User Interface Development for Embedded Systems
sponsored by Mentor Graphics
TECHNICAL ARTICLE:
An embedded system is a special-purpose system in which the computer is completely encapsulated by or dedicated to the device or system it controls.
Posted: 10 Mar 2009 | Published: 13 Jan 2009
|
|