EZINE:
In this week's Computer Weekly, we look back at the UK government's AI Safety Summit and assess what it achieved – and what it didn't. Our latest buyer's guide examines the future of business software and modernising legacy applications. And we find out how the UK PSTI Act aims to protect your smart devices. Read the issue now.
EGUIDE:
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
EZINE:
In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.
EZINE:
In this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.
EZINE:
In this week's Computer Weekly, a tech expert is set to earn millions after successfully blowing the whistle on vulnerabilities in Cisco's video surveillance software. Our latest buyer's guide examines the issues around big data architecture. And we look at how the end of Windows 7 could spark a new era for desktop productivity. Read the issue now.
EZINE:
An app aimed at helping dementia patients and their families has been developed by the Alzheimer Society in the Netherlands and has been welcomed with enthusiasm.
ANALYST REPORT:
The dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?
EGUIDE:
Since the data center infrastructure management (DCIM) market seems nearly limitless, it is important to have an evaluation process to find the software platform that best meets your organization's unique needs. This e-guide discusses the six key evaluation areas necessary to finding the DCIM tool that works best for you.
EGUIDE:
Software-defined WAN (SD-WAN) is taking over for traditional WAN, but not without taking a few lessons from its predecessor. Because of this, we have seen two significant trends in SD-WAN emerge; SD-WAN and WAN optimization techniques are merging and SD-WAN as a service. Access this e-guide for details.
EBOOK:
Download this expert handbook to uncover several new forms of technology that are integral to the intelligent enterprise and learn how these tools can help to boost employee experience and give your organization a competitive advantage.