You've requested...

Share this with your colleagues:

Download this next:

Why migrate when you can modernize?

Legacy applications like IBM i are getting harder and harder to maintain. Developers familiar with these apps are retiring, and newer developers prefer to work with languages they’re more familiar with.

Is it worth maintaining these legacy apps, or should you take the risk of moving to something new?

Take a look at this whitepaper to learn how to think of these issues as opportunities and modernize your legacy apps with optimized workflows and integration.

These are also closely related to: "HTML5: Painting with Canvas"

  • Jericho Forum: Data Protection


    This white paper contends that data protection to meet today's and tomorrow's requirements needs to provide stronger, more flexible protection mechanisms around the data itself.


    It reviews the issues surrounding data protection today, then assesses what properties data protection mechanisms should have to meet current and future requirements, and considers why current technologies don't deliver what is required.


    It goes on to propose data protection principles for evaluating how adequately any given data protection mechanism performs in meeting key requirements.


    Having painted this canvas, it looks at the evolution of past measures to protect data, and from that derives a step-by-step path predicting how data protection can be developed to meet the security needs of the future.


     Click on the button below to download this report



    The Jericho Forum is part of the The Open Group,  a supplier-neutral and technology-neutral consortium spanning all sectors of the IT community - IT customers, systems and solutions suppliers, tool vendors, integrators and consultants, as well as academia and researchers.

  • CW Benelux ezine August 2016

    The Dutch are renowned for being creative with technology and the country has a deep history in art, boasting some of the most celebrated painters for example. It is therefore apt that the combined tech brains of ING, Microsoft the Technical University of Delft and other contributors created The Next Rembrandt, which is a visual showcase for big data.

    The new portrait in the style of Rembrandt van Rijn was put together by a combination of big data technology and 3D printing. All of Rembrandt’s 346 paintings were analysed with data analytics making possible to create a seemingly genuine Rembrandt image, while a 3D printer made accurate emulation of his paint patterns a reality.

    Also in the Netherlands we feature a case study about how The Hague is solving a bike parking headache with a mobile app.

Find more content like what you just read:

  • DevSecOps delivers better business

    Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.


  • Threat intelligence sharing and the government's role

    This survey for Alien Vault paints a picture of how threat intelligence is obtained, utilised and shared, and seeks out views as to the role the government and law enforcement has to play to help better protect enterprises from threats.


  • 5 immutable truths about hybrid cloud storage

    One of the most unclear – yet compelling – aspects of hybrid cloud storage is the gap between how it's regarded by actual users versus those who simply discuss the trend. This e-book seeks to resolve those discrepancies. Download a copy to parse out the myths from the reality.


  • What keeps HR up at night?

    This survey from SilkRoad identifies the three top technology worries of HR professionals when it comes to introducing HR technology software into their business.


  • March ezine: Making tracks to SD-WAN growth

    SD-WAN is a technology on the rise and there are clearly plenty of channel opportunities out there for those that get a firm grip on deployment and installation


  • CW ANZ: Fix the weak links

    In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.


  • CW ASEAN: Defend against disruption

    In this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.


  • IT deployments without having to write code

    Read about a cutting-edge ITSM platform that uses graphical tools to configure and deploy new applications – all without any installation steps or having to write additional lines of code.


  • JavaScript – 20 Lessons to Successful Web Development

    Robin Nixon gives a practical guide to JavaScript coding in this extract from his book, JavaScript – 20 Lessons to Successful Web Development.


  • 12 ways to prevent human error in your data center

    Inside this 43-page guide, read through the 12 elements that comprise a balanced and airtight facility management program. From emergency response to personnel management – and everything in between – get tactical advice on the key components that every O&M agenda should contain.


  • 29 pg. guide: Nutanix AHV cluster and scripting best practices

    Inside this 29-page eBook, learn best practices for running Oracle databases on Nutanix AHV clusters, as well as tips and ESXi settings recommendations for iSCSI, networking, Linux OS, and more.


  • CW Buyer's Guide: Healthcare in IT

    This 7 page buyer's guide looks at the future of electronic healthcare records, healthcare technology and the use of mobile technology.


  • SAP Managed Services Survey Findings

    During Q2, 2010 The Birchman Group carried out a survey focused on SAP support and managed services.


  • How to reduce the risk of phishing attacks on your company

    Every employee with an email address within your organization is a risk to your business. How those employees react to a phishing attempt can be critical to the success or destruction of your business. In this blog, learn how INKY Phish Fence can help reduce the risk of phishing attacks on your company.


  • The 3 components of cognitive service management, explained

    Both internal and external service management strategies are in the midst of a substantial paradigm shift thanks to the growing viability of cognitive technology and automation. Inside, dive into the three core elements that comprise a modern cognitive service management strategy.


  • Gartner: HTML5 and the journey to the modern web

    Gartner analysts explain what steps IT departments need to take to take advantage of HTML5 and why they need to act sooner rather than later.


  • 6 tips to reinvent your sales pitch

    This 13-page e-book offers instruction on selling managed services, with 6 tips on reinventing your sales pitch for that purpose. Download your copy here to get started.


  • Automating Information Governance - assuring compliance

    This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.


  • Open Group: FAIR -ISO/IEC 27005 Cookbook

    The purpose of this document is to help the security practitioner responsible for their organization’s risk estimation function to utilize The Open Group Risk Management Frameworkin an ISO/IEC 27005 structured process.


  • Infographic: 2019 Europe IT Priorities - Security

    In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by, and


  • G-Cloud Report: Data Centre Strategy G-Cloud and The Applications Store for Government - Commercial Strategy Team

    The commercial potential of cloud computing and cloud services is widely accepted, both in private industry and in the public sector.  The opportunities for cost reduction and efficiency in the UK public sector are real and achievable, but require significant changes to procurement practices, delivery frameworks and across the supplierlandscape.


  • Computer Weekly Buyer's Guide to SME IT

    Managers in small and medium sized businesses used to treat IT as a luxury they could only just afford.


  • Effective print management

    Analysts Louella Fernandes and Clive Longbottom offer tips on developing an effective print management strategy.


  • SOC-as-a-service: An expert e-book

    Explore this e-book for insights on cyberattacks and threats, security operation centers as-a-service, and much more.


  • Infographic: 2019 Europe IT Priorities - Datacentre

    In this infographic, we take a look at what technological elements of the datacentre are expected to be the most important in 2019, the most popular datacentre projects and which technologies and services are being deployed. Survey results taken from the 2019 IT Priorities survey carried out by, and


  • Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated

    This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.


  • Case study: Consolidating network info into a single repository

    In this case study, learn about 1 media company's experience implementing Forward Enterprise—which gave them a centralized, searchable repository of all network information that could be used for training, diagnostics, maintenance or audit purposes.


  • Advance endpoint protection & ensure security risks are mitigated

    Many endpoint strategies are fixated on stopping malicious attacks, rather than seeking out indicators of attacks that can point to breach activity, even when malware isn't present. Key into this white paper to uncover 5 essential elements of next-generation endpoint protection.


  • A Computer Weekly buyer's guide to cloud-native architectures

    Cloud-native architectures are seen as the future for businesses. In this 16-page buyer's guide, Computer Weekly looks at the influence of DevOps and microservices-based technology, the continued importance of security in containers for software development and the suitability of Microsoft Azure for deploying cloud-native applications


  • Phishing attacks 101 – don't take the bait

    Email phishing scams are often successful and can put your organization at major risk with stolen credentials and credit card information. In this infographic, discover tips and tricks for detecting a potentially successful email phishing scam today.


  • Your strategy for building APIs

    When designing RESTful APIs there are a multitude of important factors to consider. Will you use the open process approach? Or is the model approach a better fit? How will you choose a design tool? There are 5 important elements to consider in that decision. Explore all of your options and more in this guide from


  • How can cloud users optimize their framework as usage increases?

    While cloud migration gives your business great flexibility and efficiency at scale, understanding how to manage elements within the cloud can be challenging. Watch this webcast to learn the basic of cloud frameworks, and how your business can optimize its tools as it grows.


  • Top 5 business factors for ecommerce enterprises

    Inside, learn about the top 5 business factors for a successful ecommerce enterprise. Learn how to improve the state of your online retail organization with expert advice from SFG, and see what your organization could be doing to streamline your ecommerce operations.


  • Cloud communications: 3 ways to ensure high quality of service

    Are you considering moving your business communications to the cloud, or upgrading your current VoIP service, but worried about the voice Quality of Service (QoS)? Read this excerpt from Intermedia's technical white paper "Not All Voice Clouds Are Created Equal" about what sets Intermedia voice cloud apart from the competition.


  • Cloud contact center benefits include simplicity, integrations

    The line between unified communications and the contact center is blurring as organizations look to bring both technologies together via cloud adoption. In this expert guide, find out if moving your contact center to the cloud is right for you, and explore 5 tips for picking a call center CX platform.


  • Traditional BI vs. Spotfire X: Analytics comparison

    Spotfire X has been built from the ground up for streaming data analytics. Read this white paper for 7 essential elements to this streaming BI technology, and what it is capable of doing for your business.


  • 3 elements to develop a digital-first procurement mindset

    In Part 1 of this series on digital procurement transformation, get into the mindset of a digital-first procurement officer by thinking holistically about 3 elements: process, people and technology.


  • Deliver a more connected collaboration experience

    In this white paper, learn about cloud-based unified communications platforms and how they can help eliminate common disruptions—like dropped calls or audio that cuts out in meetings—and deliver a more connected experience.


  • How can a business assessment help your cloud migration?

    Businesses considering migrating to the cloud should perform an assessment to ensure their preparation matches their ideal migration journey. Watch this brief training video to learn the 4-step process of transitioning to the cloud, and all elements that you should focus on to improve this journey.


  • How marketing automation unifies disparate marketing tools

    Read this e-book to learn the many benefits of marketing automation and how you can use it to unify your current marketing tools and reduce repetitive maintenance workloads.


  • The Current State of Hyperconvergence

    Hyperconverged infrastructure (HCI) is a significant demarcation in the history of enterprise computing and enables IT organizations to meet the challenging demands of doing more with less. In this white paper, you will learn what exactly HCI is and how the pieces fit together to improve your data center's storage.


  • Straight to the Top. CIO Leadership in a Mobile, Social, and Cloud-based World

    There is a growing trend to emphasise the business skills of CIOs, but in-depth knowledge of technology is still necessary for CIOs to succeeed, writes Gregory S. Smith, in this extract from his book, Straight to the top.


  • 3 critical elements of successful digital transformation, unraveled

    Under the pressures of digital transformation, IT departments around the world are scrambling to find innovative new ways to support business growth. Download this white paper to learn about the three essential elements that comprise every successful digital transformation strategy – and how to incorporate them into your own.


  • Explore the differences between top CASBs

    Cloud access security brokers are becoming a must have for enterprises as they commit to the cloud. Which CASB vendor is best for yours?


  • The rise of ransomware & the attraction of the cloud

    This white paper zeroes in on the various components of a cloud environment and offers best practices for creating a secure infrastructure. Read on for 11 ways to ensure strong security best practices in your organization.


  • Why are the lines between marketing and IT blurring?

    In this article, explore how martech has continued to evolve and influence marketing departments around the globe. Discover how the blurring of marketing and IT lines has influenced the rise of martech, and learn how a Contentstack headless CMS can help unburden marketing and IT teams alike.


  • Computer Weekly buyer's guide to mobile app development

    In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.


  • A Computer Weekly Buyer's Guide to Enterprise social networking

    Companies are discovering the many advantages of communicating through social networking platforms. In this 14-page buyer's guide, Computer Weekly looks at how they can revolutionise collaboration, the options available for retailers and the pitfalls of communication overload