EGUIDE:
Network virtualisation, the process of making networking infrastructure more agile by running network functions on industry-standard server hardware, has long-promised huge benefits for the IT department by improving network speed, reliability, flexibility, scalability and security.
EGUIDE:
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
ESSENTIAL GUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of May over the past five decades.
EZINE:
In this week's Computer Weekly, the BBC faces in-depth scrutiny over its digital plans – we take a look at progress. Do you need to keep data forever? We examine the technologies behind infinite storage. And we find out about the digital transformation challenges in vehicle dealerships. Read the issue now.
EZINE:
In this week's Computer Weekly, we examine the role of green tech in helping businesses contribute to the government's 2050 net-zero targets. We also talk to Spotify about the importance of open source for the music streaming service and how hybrid working is evolving as the post-pandemic workplace continues to change. Read the issue now.
EZINE:
An app aimed at helping dementia patients and their families has been developed by the Alzheimer Society in the Netherlands and has been welcomed with enthusiasm.
EGUIDE:
In this infographic, we shine a light on our 2019 IT Priorities survey results. Discover what IT departments are investing in and how much budgets are increasing by. Taken from a study of 151 respondents from across Middle East.
EZINE:
In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.
EGUIDE:
Secure Access Service Edge (SASE) is a cloud-based platform that provides networking capabilities and security functionality directly to endpoints that connect to the platform. In this guide, explore how the limitations of traditional networking led the industry to SASE.