You've requested...

Download this next:

A Computer Weekly buyer's guide to application modernisation

Unlike digital-first organisations, traditional businesses have a wealth of enterprise applications built up over decades, many of which continue to run core business processes. In this 15-page buyer’s guide, Computer Weekly investigates how organisations are approaching the modernisation, replatforming and migration of legacy applications. We look at the tools and technologies available, change management, and the use of APIs and containerisation to make legacy functionality and data available to cloud-native applications.

These are also closely related to: "DNX Windows Modernisation Solution"

  • Upgrade or rework: Pathway to application modernisation

    If there is one certainty in IT, it is that at some point, every shiny new application will become legacy. The tech sector is driven by a fast cadence of innovation, which means that last year’s “must have” phenomenon quickly becomes stale and out-of-date. In this e-guide, we explore the different approaches to modernising outdated IT systems.

  • The great IAM - time to modernise?

    The discipline of information security is about letting the good guys in as well as keeping the bad guys out. But it is inevitably less “sexy” than its cyber-security twin.

    Nevertheless, Identity and Access Management is of a high strategic order importance, especially for large, complex corporate organisations with many types of employee requiring specific levels of access to particular kinds of information. And this has been accentuated in recent years by the need to be in compliance with the EU’s General Data Protection Regulation.

    In this e-guide we offer a refresher in IAM and highlight some of the trends that have an impact on it.

    Consumer identity and access management is a more recent sub-category with in IAM, with the first systems for this appearing in 2014. It still an “early-days” market, according to specialist analyst firm KuppingerCole. The business cases for this technology include targeted marketing to increase revenue, authentication of customers to enable single sign-on, providing a better user experience, and regulatory compliance.

    As with other areas of enterprise software, IAM is being reshaped, at least to some degree, by the rise of artificial intelligence in tandem with the maturation of big data analytics. And so, user behaviour analytics is becoming a link between identity management and “keep the bad guys out” security. Instead of focusing only on what is happening in a network, UBA is – again according to KuppingerCole, about users and what they are doing, and analysing that to identify anomalies that can be investigated as potential indicators of risk or threat.

    Cloud computing is another big vector of transformation in corporate IT and it, too, is having an effect on IAM. As this “tip” article discusses, the more cloud services we use, the more identities security professionals have to provision within these environments. Many SaaS [software as a service] scenarios often betoken a lack of control over account lifecycles.

    The British Red Cross and online auction platform Catawiki are among organisations wrestling with the complexities of modern identity and access management, with SaaS applications in play at both. The former has to manage access for 2,500 permanent internal users and a further 20,000 volunteers. The latter is an auction platform for rare and hard-to-find objects and experienced rapid early-stage growth that necessitated on-boarding new employees to a variety of business applications more quickly than anticipated. Both have turned to single sign on technology.

    As employee workstyles change beyond the “9 to 5 on a single site” paradigm of old, enterprises are having to cope with evermore complex access patterns. For many organisations it might be time to revisit their identity and access management strategies and modernise them.

Find more content like what you just read:

  • The complete guide to becoming a data-driven organization

    Rapid modernisation in the cloud is the most direct path to reaping the benefits of the analytics and machine learning technologies that can position an organisation as a market leader. So, what are you waiting for? Read on to learn how you activate your vast stores of data to enable higher customer acquisition rates and increased profits.

    Download

  • A Computer Weekly buyer's guide to modern enterprise resource planning

    The use of modern enterprise resource planning can make a business more agile. In this 14-page buyer's guide, Computer Weekly looks at how to best prepare for modernisation, the opportunity to build sustainably and how to unshackle your firm from unplanned upgrade needs.

    Download

  • Developing the Intelligent Core with Windows Server 2019

    65% of European CEOs are under significant pressure to deliver on their digital transformation (DX) strategies. Creating a digital platform with an intelligent core is key to success. Learn more about digital platforms inside this resource.

    Download

  • Computer Weekly - 21 April 2020: Taking robot technology to a New World

    In this week's Computer Weekly, we talk to the technology team behind a project to recreate the voyage of the Mayflower using a fully autonomous ship. We look at how India's coronavirus lockdown is affecting UK companies that use offshore outsourcing. And we examine the challenges of making edge computing work. Read the issue now.

    Download

  • Computer Weekly - 31 March 2020: Can the internet take the strain?

    In this week's Computer Weekly, as millions of people work from home, we examine the measures in place to make sure the internet stays up and running. Our latest buyer's guide looks at the best practice in application modernisation. And we find out how IT leaders are tackling the skills shortage to recruit the best tech talent. Read the issue now.

    Download

  • IT Priorities 2020: Budgets rejigged to support 2021 recovery

    IT has been essential in helping organisations remain operational. IT chiefs are now considering the IT to drive a sustained business recovery.

    Download

  • What does cloud computing look like in 2016?

    Cloud computing today is in a phase of rapid take-up. Technology as a service is a top priority for CIOs in Southeast Asia.This guide gives examples of how cloud computing is being harnessed within the region.

    Download

  • How the application integration landscape is changing

    In this e-guide, we discover how the industry is trying to make it possible to link applications together in order to share resources with ease. We take a look at how technologies like Distributed Computing and the Common Object Model have been refined into web services, service-oriented architecture and composable applications and microservices.

    Download

  • Computer Weekly – 23 May 2023: How to secure your software supply chain

    In this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.

    Download

  • Computer Weekly - 5 May 2020: The role of AI in the war against pandemics

    In this week's Computer Weekly, we look at how AI and data science are supporting the global push to deal with the coronavirus pandemic. We reveal, and talk to, the man behind the world's first computer virus pandemic, the Love Bug. And we examine how the IT services market will change as a result of the current crisis. Read the issue now.

    Download

  • Computer Weekly – 31 May 2022: Trial and error – why the law on computer evidence must change

    In this week's Computer Weekly, the Post Office IT scandal highlighted the problem with computer evidence – we examine the need for legal reform. We assess the nuclear option for sustainable datacentre power. And we find out how IT experts can improve their soft skills and boost their career prospects as a result. Read the issue now.

    Download

  • Computer Weekly - 7 April 2020: Adapting IT to the new normal

    In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.

    Download

  • Computer Weekly - 3 March 2020: What will points-based immigration mean for IT recruitment?

    In this week's Computer Weekly, we look at the government's new points-based immigration rules and assess the implications for the tech sector. IR35 tax rules change in April – we find out how IT contractors need to prepare. And we examine whether the rise of cloud is really displacing the datacentre. Read the issue now.

    Download

  • CW Nordics May-July 2020: Startups face tough decisions as coronavirus fallout hits

    Tech startups based in the Nordic region face difficult decisions as the Covid-19 pandemic leads to falling sales and investment.

    Download

  • Computer Weekly – 12 May 2020: Will the NHS's Covid-19 contact-tracing app work?

    In this week's Computer Weekly, we get the expert reaction to find out if the NHS contact-tracing app will work. Staying close to clients is crucial through lockdown – we look at the importance of customer experience management. And one CIO explains how he implemented a digital transformation plan in two weeks. Read the issue now.

    Download

  • Computer Weekly – 20 February 2024: Flying into cloud – EasyJet's journey out of the datacentre to AI

    In this week's Computer Weekly, we find out how EasyJet fills an aircraft every 10 seconds while migrating to the cloud and introducing AI. There's only 283 years to go until we have a diverse IT workforce – we find out why. And we examine how the UK anti-trust investigation into the cloud market could hit the big hyperscalers. Read the issue now.

    Download

  • CW APAC, December 2021: Expert guide to cloud migration

    In this handbook, Computer Weekly looks at the key considerations and strategies that enterprises can take when moving their workloads to public cloud

    Download

  • CW Innovation Awards: Flybuys cranks up cloud for service efficiency

    In this case study, learn about Flybuys' migration to the cloud, how they integrated security from the start and developed a change management plan to ensure key stakeholders were proactively engaged.

    Download

  • Computer Weekly – 24 April 2018: London plans to be a smarter city

    In this week's Computer Weekly, we meet the first ever chief digital officer for London and find out his plans to make the capital a smarter city. SAP has overhauled its controversial indirect licensing policy – we look at the implications. And what are the jobs of the future in retail as the sector is transformed by technology? Read the issue now.

    Download

  • A Computer Weekly buyer's guide to going beyond desktop Computing

    A digital workplace opens up a range of new possibilities for businesses, but it needs to be implemented in the right way. In this 13-page buyer's guide, Computer Weekly looks at how digital workplaces demand increasing functionality, how to make sense of desktop as a service, and the value of unified endpoint management.

    Download

  • Can AI take education to a new level?

    In this week's Computer Weekly, we examine how LLMs are being used to teach, support and assess students, enhancing education rather than impairing it. We look at how AI is impacting the semiconductor sector as big tech companies put off server upgrades. And we find out how GenAI is changing the way enterprise software works. Read the issue now.

    Download

  • Computer Weekly – 14 November 2023: The UK AI Safety Summit – what did it achieve?

    In this week's Computer Weekly, we look back at the UK government's AI Safety Summit and assess what it achieved – and what it didn't. Our latest buyer's guide examines the future of business software and modernising legacy applications. And we find out how the UK PSTI Act aims to protect your smart devices. Read the issue now.

    Download

  • Escaping legacy – removing a major roadblock to a digital future

    Core legacy systems inhibit businesses' ability to meet changing customer demands in the digital age. The scale and nature of the problem is such that it needs to be addressed now.

    Download

  • Use Windows 7 end of life to update desktop productivity

    The end of support for Windows 7 should be seen as the end of an era for traditional desktop IT. So what does 21st century desktop productivity look like?

    Download

  • A Computer Weekly buyer's guide to intelligent workload management

    One huge advantage digital transformation brings with it is the phenomenon of intelligent workload management. In this 17-page buyer's guide, Computer Weekly looks at the various tools available, asset management best practices and the complications to look out for with hybrid and multicloud deployments.

    Download

  • Computer Weekly – 17 April 2018: Can China's Alibaba successfully take on the US public cloud giants?

    In this week's Computer Weekly, as Chinese cloud provider Alibaba grows its presence in Europe, we ask if it can compete with the US public cloud giants. A government plan to move data policy has caused controversy among Whitehall digital experts – we find out why. And we assess the use of cloud for disaster recovery. Read the issue now.

    Download

  • A Computer Weekly buyer's guide to modernising public sector IT

    Digitising the public sector is proving to be a long and winding road. In this 15-page buyer's guide, Computer Weekly looks at how some CIOs are embracing digital transformation, how coronavirus has accelerated it and why the UK government needs to embrace the challenge of digital collaboration

    Download

  • Computer Weekly – 15 October 2019: Securing the internet of things

    In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.

    Download

  • Inside Bendigo and Adelaide Bank's cloud journey

    With a strong DevOps culture, Australian bank has been moving its most important applications to the cloud in a journey that has already reaped returns. Download the full article to learn more about Bendigo and Adelaide Bank's cloud journey.

    Download

  • Computer Weekly – 30 August 2016: Get protected

    It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.

    Download

  • Computer Weekly - 27 July 2021: Are we getting cyber security skills all wrong?

    In this week's Computer Weekly, the chair of the new UK Cyber Security Council tells us how she plans to fundamentally reimagine what working in IT security means. Our latest buyer's guide examines ERP modernisation and its role in digital transformation. And we take an in-depth look at the first preview version of Windows 11. Read the issue now.

    Download

  • CW Innovation Awards: Bharti Airtel taps OpenStack to modernise telco network

    In this case study, learn how Bharti Airtel built a new telco network cloud, providing the foundation for its next-generation core network, analytical tools, and new consumer and enterprise services.

    Download

  • Computer Weekly Buyer's Guide to services for digitisation and IoT

    In this 13-page buyer's guide, Computer Weekly looksat the use of mid-sized nearshore IT service providers, choosing a cloud-based platform, and how to manage the huge volume of IoT data.

    Download

  • Executive Interview: Tapping APAC's storage potential

    Lenovo's head of storage in Asia-Pacific singles out the region's market opportunities and predicts that the healthcare sector will go full-fledged with flash storage in the next year.

    Download

  • Hybrid cloud: Building bridges between the cloud and enterprise datacentres

    In this e-guide, we take a closer look at how the major cloud providers are making it possible for their users to shift their datacentre-based applications and workloads to the cloud, as enterprise demand for hybrid deployments continues to soar.

    Download

  • Top 10 cloud stories 2018

    While cloud has established itself as the preferred way for many enterprises to consume IT resources, organisations in some vertical markets have taken markedly longer to come round to its charms. With this as a backdrop, Computer Weekly takes a look at the top 10 cloud stories of 2018.

    Download

  • CW Innovation Awards: How DBS is transforming credit processes

    In this case study, learn how DBS Bank's credit architecture programme has digitised and reimagined credit processes through a unified platform that has improved the productivity and efficiency of its credit teams.

    Download

  • A university’s path to Wi-Fi 6: Case study

    Leeds Beckett is a leading public university with over 28,000 students. Key to supporting those students is facilitating seamless digital experiences. To do so, Leeds Beckett set out to modernize its network infrastructure. So, how did the university accomplish that mission? Find out in this case study.

    Download

  • Strategies for winning the battle for the policyholder

    According to recent research insurance profits fell by about 15% across the sector over the last year. This white paper examines the opportunities for insurance businesses willing to lean in on new and emerging technologies and outline the strategies that could bring success in a sector in flux. Download now to learn more.

    Download

  • Modern productivity: Enhance efficiency across the document lifecycle

    To keep up with the demands of today’s fast-paced hybrid work environment, businesses must implement digital document processes that are efficient, consistent, and secure. Read on to learn more.

    Download

  • A Computer Weekly buyer's guide to operational IT

    In this 14-page buyer's guide, Computer Weekly looks at applying back-office IT to industrial machines, how businesses can further digitise their operations, and how best to tap into data held in mainframes.

    Download

  • Computer Weekly – 6 February 2024: Generative AI – an early adopter's experience

    In this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.

    Download

  • Computer Weekly – 5 June 2018: The bumpy ride to digital transformation

    In this week's Computer Weekly, we look at the lessons to be learned from General Electric's bumpy ride to digital transformation. We assess the use of software-defined networking in corporate IT infrastructures. And we find out how Royal Bank of Scotland approaches digital and business innovation. Read the issue now.

    Download

  • Computer Weekly - 8 February 2022: Exploring the metaverse

    In this week's Computer Weekly, the metaverse is set to become a highly competitive commercial playground –profitable markets but also high-profile failures will follow. IT contractors have been hit by cyber attacks on the firms that pay their wages – we examine the impact. And we ask if it's time to plan for quantum computing. Read the issue now.

    Download

  • CW Middle East Oct to Dec 2016

    In this quarter's CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world.

    Download

  • A Computer Weekly buyer's guide to perimeterless network security

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

    Download

  • Case Study: M&A in action - How Majestic Wine paired with Naked Wines to fuel cloud-led digital transformation

    Find out how the acquisition of online-only wine retailer Naked Wines in 2015 has shaped the digital transformation plans of its parent company Majestic Wine

    Download