EGUIDE:
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
ESSENTIAL GUIDE:
Computer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything - this presentation was given by Steven Armstrong, principal automation engineer at Paddy Power Betfair.
EZINE:
In this week's Computer Weekly, we look back at the UK government's AI Safety Summit and assess what it achieved – and what it didn't. Our latest buyer's guide examines the future of business software and modernising legacy applications. And we find out how the UK PSTI Act aims to protect your smart devices. Read the issue now.
EBOOK:
In this week's Computer Weekly, Microsoft CEO Satya Nadella explains why he has made empathy a key part of technology innovation. We examine the latest news in the ongoing debate over the tax status of IT contractors in the public sector. And we ask if an emphasis on creativity will help attract more young people to work in IT. Read the issue now.
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
EBOOK:
Learn why an application modernization and digital transformation strategy can be a unique challenge to everyone, along with some common solutions.
EGUIDE:
Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.
EGUIDE:
Before you invest in data center infrastructure management (DCIM) tools, you need to know your needs and how to analyze whether a prospective tool will meet them. In this e-guide you will learn how to evaluate and compare DCIM software platforms based on key considerations.
EZINE:
In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.
ANALYST REPORT:
According to Gartner, vendors must demonstrate both "completeness of vision" and an "ability to execute" to be evaluated as a leader. Gartner's 2011 Magic Quadrant for Integrated Software Quality Suites evaluates IBM as a leader. Read the report to learn more.