EZINE:
The cloud is so pervasive within enterprises today that it is easy to understate the way it has changed businesses. The internet of things is putting your security at risk. How did application performance monitoring prevent a business disaster? Read on to explore all this and much more.
EZINE:
In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
WHITE PAPER:
This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
CASE STUDY:
With the skyrocketing popularity of Zynga games such as FarmVille – which is now the largest single application on Facebook – Zynga’s technology strategy has to be as savvy as its business model. Find out why Zynga now relies on cloud services to manage its precipitous growth, maintain high availability, and keep costs in check.
EGUIDE:
The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.
EZINE:
In this week's Computer Weekly, the Post Office IT scandal inquiry continues to reveal shocking details – we review the latest evidence. We examine progress of the roll-out of fast broadband across the UK. And as the Online Safety Bill returns to Parliament, we look at the arguments about how to keep the internet safe. Read the issue now.
INFOGRAPHIC:
Before implementing Enterprise Content Management, it's important for organizations to develop an ECM roadmap or strategy to identify the top priorities and get clarity on the necessary procedures and technologies it entails. This infographic outlines the steps to successfully implement an ECM system.
EZINE:
In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.
EGUIDE:
Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.