You've requested...

Share this with your colleagues:

Download this next:

Avoid migrating: A guide to modernizing legacy apps

Legacy applications like IBM i are getting harder and harder to maintain. Developers familiar with these apps are retiring, and newer developers prefer to work with languages they’re more familiar with.

Is it worth maintaining these legacy apps, or should you take the risk of moving to something new?

Take a look at this whitepaper to learn how to think of these issues as opportunities and modernize your legacy apps with optimized workflows and integration.

These are also closely related to: "HTML5: Painting with Canvas"

  • CW Benelux ezine August 2016

    The Dutch are renowned for being creative with technology and the country has a deep history in art, boasting some of the most celebrated painters for example. It is therefore apt that the combined tech brains of ING, Microsoft the Technical University of Delft and other contributors created The Next Rembrandt, which is a visual showcase for big data.

    The new portrait in the style of Rembrandt van Rijn was put together by a combination of big data technology and 3D printing. All of Rembrandt’s 346 paintings were analysed with data analytics making possible to create a seemingly genuine Rembrandt image, while a 3D printer made accurate emulation of his paint patterns a reality.

    Also in the Netherlands we feature a case study about how The Hague is solving a bike parking headache with a mobile app.

  • Jericho Forum: Data Protection

     

    This white paper contends that data protection to meet today's and tomorrow's requirements needs to provide stronger, more flexible protection mechanisms around the data itself.

     

    It reviews the issues surrounding data protection today, then assesses what properties data protection mechanisms should have to meet current and future requirements, and considers why current technologies don't deliver what is required.

     

    It goes on to propose data protection principles for evaluating how adequately any given data protection mechanism performs in meeting key requirements.

     

    Having painted this canvas, it looks at the evolution of past measures to protect data, and from that derives a step-by-step path predicting how data protection can be developed to meet the security needs of the future.

      

     Click on the button below to download this report

     

     

    The Jericho Forum is part of the The Open Group,  a supplier-neutral and technology-neutral consortium spanning all sectors of the IT community - IT customers, systems and solutions suppliers, tool vendors, integrators and consultants, as well as academia and researchers.

Find more content like what you just read:

  • How to translate application log files into action

    Download this E-Guide from SearchITOperation.com to find out how to harness application log management tools and guidelines to successfully interpret application log data and generate meaningful insights.

    Download

  • The differences between migration and archiving

    While there are similarities, the differences between data migration and archiving can have a big impact on your organization. Download this white paper to dig into the differences between archiving and data migration so that you can strategically apply each in your organization.

    Download

  • DevSecOps delivers better business

    Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.

    Download

  • DevSecOps delivers better business

    Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.

    Download

  • Threat intelligence sharing and the government's role

    This survey for Alien Vault paints a picture of how threat intelligence is obtained, utilised and shared, and seeks out views as to the role the government and law enforcement has to play to help better protect enterprises from threats.

    Download

  • What keeps HR up at night?

    This survey from SilkRoad identifies the three top technology worries of HR professionals when it comes to introducing HR technology software into their business.

    Download

  • March ezine: Making tracks to SD-WAN growth

    SD-WAN is a technology on the rise and there are clearly plenty of channel opportunities out there for those that get a firm grip on deployment and installation

    Download

  • CW ANZ: Fix the weak links

    In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.

    Download

  • CW ASEAN: Defend against disruption

    In this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.

    Download

  • 19-pg guide to scaled DevOps

    Today’s software development is still monolithic, siloed, and manual. DevOps’ mission is to change that—but can DevOps stay effective as your organization scales? This 19-page guide reviews the critical elements to a typical DevOps solution and explores how organizations can evolve their DevOps strategies at scale.

    Download

  • 12 essential elements of data center facility operations

    Inside this 43-page guide, read through the 12 elements that comprise a balanced and airtight facility management program. From emergency response to personnel management – and everything in between – get tactical advice on the key components that every O&M agenda should contain.

    Download

  • CW Buyer's Guide: Healthcare in IT

    This 7 page buyer's guide looks at the future of electronic healthcare records, healthcare technology and the use of mobile technology.

    Download

  • SAP Managed Services Survey Findings

    During Q2, 2010 The Birchman Group carried out a survey focused on SAP support and managed services.

    Download

  • Negotiation tips for software contracts

    Negotiation is a difficult skill to master—negotiating software licenses in particular can feel impossible—but with the right coaching, that can change. This 9-page guide is here to help you work on your negotiation skills.

    Download

  • A complete guide to negotiating with Microsoft

    In this 28-page guide, discover actual discounts obtained in hundreds of Microsoft deals for products like M365, O365, SQL Server, Dynamics, Azure and more, 4 elements that are crucial to building a case to get a great deal, the best ways to avoid over-buying or under-buying, and more.

    Download

  • Key elements to successful high-volume distributed card issuance

    In this white paper, learn about key elements of a productive, secure and reliable distributed credential issuance system.

    Download

  • Omnichannel contact center: Vital elements for success

    What are the key elements you need for a successful omnichannel contact center? Find out in this checklist, which you can download and use to maximize the effectiveness of your strategy.

    Download

  • Gartner: HTML5 and the journey to the modern web

    Gartner analysts explain what steps IT departments need to take to take advantage of HTML5 and why they need to act sooner rather than later.

    Download

  • Automating Information Governance - assuring compliance

    This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.

    Download

  • JavaScript – 20 Lessons to Successful Web Development

    Robin Nixon gives a practical guide to JavaScript coding in this extract from his book, JavaScript – 20 Lessons to Successful Web Development.

    Download

  • A Computer Weekly buyer's guide to network upgrades for cloud-native infrastructure

    With enterprises increasingly turning to digitisation and cloud computing, there is renewed interest in networking and a greater need for agility. In this 15-page buyer's guide, Computer Weekly looks at what IT decision-makers should be thinking about in their adoption of cloud-native applications.

    Download

  • A Computer Weekly buyer's guide to modern software development practices

    The software development landscape is forever changing. In this 15-page buyer's guide, Computer Weekly looks at what it means to be a modern software developer, what's driving their innovation and how artificial intelligence can help build applications that make customers happy.

    Download

  • Enabling Scalable User Experiences with Modern Workloads on Windows Virtual Desktop

    Dive into this blog post to learn about Azure-hosted NVIDIA GPU-accelerated virtual desktops and workstations and how they can augment the workflows of your organization’s creative and technical professionals.

    Download

  • Open Group: FAIR -ISO/IEC 27005 Cookbook

    The purpose of this document is to help the security practitioner responsible for their organization’s risk estimation function to utilize The Open Group Risk Management Frameworkin an ISO/IEC 27005 structured process.

    Download

  • Infographic: 2019 Europe IT Priorities - Security

    In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

    Download

  • The critical elements of great coaching conversations

    Having regular coaching conversations with your direct reports can do wonders for not only the quality of their day-to-day work, but also their growth and development. Click through this interactive resource to explore the critical elements of great coaching conversations.

    Download

  • Computer Weekly Buyer's Guide to SME IT

    Managers in small and medium sized businesses used to treat IT as a luxury they could only just afford.

    Download

  • G-Cloud Report: Data Centre Strategy G-Cloud and The Applications Store for Government - Commercial Strategy Team

    The commercial potential of cloud computing and cloud services is widely accepted, both in private industry and in the public sector.  The opportunities for cost reduction and efficiency in the UK public sector are real and achievable, but require significant changes to procurement practices, delivery frameworks and across the supplierlandscape.

    Download

  • Converged infrastructure fundamentals

    Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive. The day of converged infrastructures has arrived.

    Download

  • Effective print management

    Analysts Louella Fernandes and Clive Longbottom offer tips on developing an effective print management strategy.

    Download

  • RSA Conference 2020 guide: Highlighting security's human element

    The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.

    Download

  • Web browser security: Akamai report reprint

    Malicious script activity has emerged as a new way for cybercriminals to conduct credit card skimming and other types of attacks. This 451 Research report provides a comprehensive overview of the Akamai Page Identity Manager, designed to combat this growing threat.

    Download

  • 2020 study: How your peers are utilizing managed services

    Save a copy of this 38-page report to explore the discoveries of an IDG Research study surveying over 1,250 IT and business leaders worldwide and across industries. Inside, you’ll get a closer look at the three key findings.

    Download

  • Infographic: 2019 Europe IT Priorities - Datacentre

    In this infographic, we take a look at what technological elements of the datacentre are expected to be the most important in 2019, the most popular datacentre projects and which technologies and services are being deployed. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

    Download

  • 3 essential elements for a successful digital transformation

    Organizations should shift their focus away from legacy systems and devote more time to streamlining and future-proofing their operations. This eBook explores exactly how IT organizations should prepare for a digital transformation, and what elements are required for that transition to be successful. Read the guide here to see the details.

    Download

  • Computer Weekly - 14 July 2020: Is digital art coming of age during lockdown?

    In this week's Computer Weekly, as the pandemic forces many sectors into a business rethink, digital art is hoping to capitalise on changing times. Chinese supplier Lenovo is dominating the supercomputer market – we examine how it got there. And as datacentre engineers become key workers, we look at the health and safety issues. Read the issue now.

    Download

  • The Nokia Fabric Services Platform: Foundational elements and key capabilities

    The Nokia Fabric Services Platform is a declarative, intent-based automation and operations toolkit that can help to deliver agile and scalable network operations for data center and cloud environments. In this white paper, learn more about the Fabric Services Platform and its foundational elements and key capabilities.

    Download

  • How to tame your data center

    Data centers are fickle beasts, from increasingly temperamental power and cooling requirements to ever-expanding networking demands. Save a copy of this E-Guide to learn tips and tricks on how to make these two critical (and, unfortunately, frequently overlooked) data center elements run smoothly.

    Download

  • Move fast, but don't break things

    The past few years have seen the adoption of agile processes in the retail sector and elsewhere. These approaches break processes down to small elements and then seek to sprint to software solutions to solve them as fast as possible. This DevOps approach to IT has unleashed innovations and brought IT closer to the business—and introduced new risks.

    Download

  • How to create an automate-first culture

    Introducing automation into your IT strategies has the potential to improve—or disrupt—your business. The key is first creating an “automate-first” culture. In this resource, discover the 4 key elements of an automate-first culture as Cutover panelists discuss their tips and tricks to getting a highly controllable, automated culture.

    Download

  • GPUs and VDI deliver organization-wide benefits: Explained

    Inside this research paper from Moor Insights & Strategy, find out how to start addressing the challenges posed by graphically demanding workloads with GPUs, leading to across the board benefits like increased data security and reduced client management costs.

    Download

  • A Computer Weekly buyer's guide to cloud-native architectures

    Cloud-native architectures are seen as the future for businesses. In this 16-page buyer's guide, Computer Weekly looks at the influence of DevOps and microservices-based technology, the continued importance of security in containers for software development and the suitability of Microsoft Azure for deploying cloud-native applications

    Download

  • Connecting the supply chain nervous system with TIBCO

    COVID-19 is driving many organizations to re-evaluate their supply chain strategies and look for opportunities to improve resiliency, flexibility and scalability. Watch this video to see how TIBCO can help you re-invigorate your supply chain to improve those 3 elements, and much more.

    Download

  • Evaluating top CASB vendors: McAfee vs Netskope vs Symantec

    The popularity of Cloud Access Security Brokers (CASBs) as an effective measure for cloud data protection is on the rise. In order to help you select the right vendor for your unique needs, Gartner conducted a comprehensive analysis of the top CASB vendors and offerings in today’s market – read on to unlock the Magic Quadrant report.

    Download

  • Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated

    This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.

    Download

  • Cloud users need to know these basics to optimize their framework

    While cloud migration gives your business great flexibility and efficiency at scale, understanding how to manage elements within the cloud can be challenging. Watch this webcast to learn the basic of cloud frameworks, and how your business can optimize its tools as it grows.

    Download

  • Network detection and response: The role of machine-learning

    In this podcast, Fidelis’ COO, Craig Harber, and Data Science Manager, Abhishek Sharma, discuss how NDR begins with detections, and the role of machine-learning within NDR.

    Download

  • Experts' take on the future of APIs

    When designing RESTful APIs there are a multitude of important factors to consider. Will you use the open process approach? Or is the model approach a better fit? How will you choose a design tool? There are 5 important elements to consider in that decision. Explore all of your options and more in this guide from SearchMicroservices.com.

    Download