EZINE:
In this week's Computer Weekly, we look back at the UK government's AI Safety Summit and assess what it achieved – and what it didn't. Our latest buyer's guide examines the future of business software and modernising legacy applications. And we find out how the UK PSTI Act aims to protect your smart devices. Read the issue now.
EGUIDE:
Blockchain deployments are rapidly becoming mainstream. Nearly 40% of respondents' companies are deploying blockchain technology, rising to 57% amongst companies with over 20,000 employees. In part, this is due to increased awareness and understanding of what blockchain entails, particularly at Founder/CEO level.
RESEARCH CONTENT:
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
EBOOK:
The way we work is changing with the exponential emergence of new technology. In this 15-page buyer's guide, Computer Weekly looks at the potential of DNA storage, how we can benefit from quantum computing in the future and the role of software in business development.
EZINE:
In this week's Computer Weekly, we visit the first hackathon at Abbey Road Studios, once home to The Beatles, to find out how tech startups hope to revolutionise music creation. Our latest buyer's guide looks at perimeterless network security. And we look ahead to the key CIO skills and jobs trends for 2019. Read the issue now.
EBOOK:
Download this expert handbook to uncover the motivation of migrating to cloud HCM and find out how the innovation will bring increasing value to your organization. Learn more about SaaS HR for innovations in AI and people analytics, and explore 5 keys to ensuring your new SaaS HR system excels.
EGUIDE:
Since the data center infrastructure management (DCIM) market seems nearly limitless, it is important to have an evaluation process to find the software platform that best meets your organization's unique needs. This e-guide discusses the six key evaluation areas necessary to finding the DCIM tool that works best for you.
WHITE PAPER:
Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.
EGUIDE:
DevOps is supposed to get your product to market as quickly as possible, while still maintaining a high level of quality and stability. The problem is that this requires automation, especially when it comes to testing. Read this e-guide to learn about the challenges to, and benefits of, automated testing in your DevOps environment.
EZINE:
In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.