EGUIDE:
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
EZINE:
In this week's Computer Weekly, we look at one of the oldest pain points for IT departments – software patching – and ask how to make it less complex across the enterprise. We examine the rise of Kubernetes, the open source container system. And we look at storage strategy to support a multicloud environment. Read the issue now.
EGUIDE:
Enterprise Content Management (ECM) has rapidly evolved as different forms of content have been introduced to the work environment. In this guide, find out how ECM works, why it is so important, the key components and benefits, and what to look for when choosing ECM software.
EGUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
ESSENTIAL GUIDE:
In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
EZINE:
In this week's Computer Weekly, DevOps is cited as a key element of digital transformation – we examine the challenges to delivering on its promise. Many retailers are investing in emerging technologies to gain an edge – but are they too far ahead of the curve? And could a new spirit of collaboration help UK broadband roll-out? Read the issue now.
ESSENTIAL GUIDE:
Computer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything - this presentation was given by Steven Armstrong, principal automation engineer at Paddy Power Betfair.
EZINE:
The new wave of enterprise mobile application development has altered how app dev fits into IT's overall strategy. Learn how the sides can come together.
EZINE:
In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.
EGUIDE:
In this expert e-guide, we explore how organizations are modernizing legacy apps for cloud, mobile, and other digital transformation initiatives with 3 different approaches to modernization, containers, and PaaS.