You've requested...

How to Prepare for the End-of-Life .NET Framework?

If a new window did not open, click here to view this asset.

Download this next:

Computer Weekly - 8 December 2020: Where next for Windows?

In this week’s Computer Weekly, love it or hate it, Windows is still the most-used operating system in enterprises – we look at where Microsoft aims to take it next. We examine some of the key questions for CIOs for their 2021 IT strategy. And we analyse the best practice in preventing distributed denial of service (DDoS) attacks. Read the issue now.

These are also closely related to: "How to Prepare for the End-of-Life .NET Framework?"

  • A Computer Weekly Buyer's Guide to Application Development and DevOps

    Harnessing the right developer tools offers new advantages for businesses. In this 14-page buyer’s guide, Computer Weekly looks at:

    • How a DevOps model builds on an agile approach to software development, but a different approach to tooling is needed
    • How Microsoft is aligning its development tools to support Linux and open source, in light of its acquisition of GitHub

    How taking a containerised, componentised and compartmentalised approach to software can help businesses better serve their customers, but also presents CIOs with the challenge of managing a more complex environment.

  • CW Middle East - January-March 2021: $60m venture capital fund targets 120 startups

    Countries in the Middle East see technology as an industry of the future and are investing heavily in the sector as part of their economic diversification plans. Read in this issue how the latest development will see a $60m venture capital fund, based in Bahrain, invest in 120 early-stage startups across the Middle East region. Also read how Saudi Arabia has signed two agreements with Chinese IT suppliers as it strives to deliver its ambitious programme to diversify its economy.

Find more content like what you just read:

  • Windows 10: How the client operating system is evolving

    A discussion about strategies for Windows 10 really boils down to the organisation's desktop IT strategy. Windows PCs account for the bulk of the personal computing market and the Windows client remains the dominant target platform for developers of client-side applications. In this e-guide, we look at the evolution of desktop IT.

    Download

  • Computer Weekly – 19 June 2018: Microsoft becomes devoted to open source developers

    In this week's Computer Weekly, after Microsoft's recent acquisition of GitHub, we examine the software giant's tools for embracing open source developers. Also, secretary of state for digital, culture, media and sport Matt Hancock talks about growing the UK digital economy and supporting the tech sector. Read the issue now.

    Download

  • Simplify your application modernization journey

    The longer you wait to upgrade your apps, the more difficult it becomes to execute. That’s why now is the time to figure out your modernization path so your organization can stay competitive. Read on to discover how you can leverage AI-assisted automation in your modernization efforts to reduce time to market, overall risk and total cost.

    Download

  • Computer Weekly - 31 March 2020: Can the internet take the strain?

    In this week's Computer Weekly, as millions of people work from home, we examine the measures in place to make sure the internet stays up and running. Our latest buyer's guide looks at the best practice in application modernisation. And we find out how IT leaders are tackling the skills shortage to recruit the best tech talent. Read the issue now.

    Download

  • A Computer Weekly Buyer's Guide to Server Operating Systems

    In this 12-page buyer's guide, Computer Weekly looks at Microsoft's latest Windows release, the state of play in the battlebetween Linux and Unix, and the future of the server operating system.

    Download

  • Take a Load Off, Admin

    In this guide, find out specific goals and key processes to address before implementing an automated server virtualization platform. Access now to learn about the benefits of automation in 3 main areas: compliance, provisioning and configuration.

    Download

  • Computer Weekly – 31 May 2022: Trial and error – why the law on computer evidence must change

    In this week's Computer Weekly, the Post Office IT scandal highlighted the problem with computer evidence – we examine the need for legal reform. We assess the nuclear option for sustainable datacentre power. And we find out how IT experts can improve their soft skills and boost their career prospects as a result. Read the issue now.

    Download

  • A Computer Weekly buyer's guide to cloud-native architectures

    Cloud-native architectures are seen as the future for businesses. In this 16-page buyer's guide, Computer Weekly looks at the influence of DevOps and microservices-based technology, the continued importance of security in containers for software development and the suitability of Microsoft Azure for deploying cloud-native applications

    Download

  • A guide to developing cloud applications using PaaS

    In this e-guide we look at the management and development tools that are required to build, deploy and operate cloud-native applications at scale.

    Download

  • Computer Weekly – 12 June 2018: How National Geographic uses tech to captivate its audience

    In this week's Computer Weekly, we find out how the world-famous National Geographic magazine is adapting to the digital age and using technology to better engage its audience. We ask what Microsoft's $7.6bn acquisition of GitHub means for the open source community. And our latest buyer's guide looks at developer tools. Read the issue now.

    Download

  • AI tools for software developers: Part Two

    The Computer Weekly Developer Network is in the engine room, covered in grease and looking for Artificial Intelligence (AI) tools for software application developers to use. With so much AI power in development and so many new neural network brains to build for our applications, how should programmers 'kit out' their AI toolbox?

    Download

  • A Computer Weekly buyer's guide to network cost and bandwidth optimisation

    Coming in under budget for appropriate network performance takes some strategic nous. In this 15-page buyer's guide, Computer Weekly looks at how companies can gain effective global coverage, what can be done to optimise networks in a shift towards hybrid working and why leaders should consider best practices carefully.

    Download

  • Computer Weekly – 4 July 2017: Be better connected in a wireless world

    In this week's Computer Weekly, we look at the latest developments in wireless technology and how to deliver secure and reliable wireless networks. We examine Microsoft's PowerShell scripting language to understand why it's such an important tool. And we ask CIOs what it's like to cross the divide and work for IT suppliers. Read the issue now.

    Download

  • E-Book: New Enterprise Desktop Chapter 3: Windows 7 Security: Strengths and Weaknesses

    Each new OS is touted as the “Holy Grail” of features that every IT pro has been waiting for. Windows 7 is no different. This chapter looks at the Windows 7 security features such as BitLocker and Action Center, and separates those that really count from those that sound better on paper.

    Download

  • E-Guide: Remediating IT vulnerabilities: Expert Tips

    This expert E-Guide uncovers 3 quick ways you can remediate IT vulnerabilities and discusses best practices for improved vulnerability management.

    Download

  • Delivering code-to-cloud security for the U.S. government

    The federal government continues to migrate to the cloud to keep pace with modern technology advancements and evolving threats. Discover why the U.S. chose Prisma Cloud to secure its cloud environment along the way and what the modern solution can do for its users today in this resource.

    Download

  • Top trends shaping APAC's tech landscape in 2024

    While GenAI is not expected to supersede other IT priorities such as cloud, application development and cyber security, it will augment those areas by making it easier to build software and improve cyber resilience. In this round-up, we review some of the key IT trends that are likely to shape the industry across the region in 2024.

    Download

  • Computer Weekly – 10 October 2023: Teeing up tech at the Ryder Cup

    In this week's Computer Weekly, we go behind the scenes at golf's Ryder Cup to see the tech firsts introduced to improve the fan experience. UK tech leaders explain why they feel 'betrayed' by the government's net-zero policy changes. Read the issue now.

    Download

  • Computer Weekly - 10 August 2021: Real-time data analytics in action

    In this week's Computer Weekly, we examine the emerging applications of real-time analytics and highlight the challenges for businesses to maximise the benefits. EU experts are calling for reform of US surveillance laws – we look at the issues. And we talk to the co-CEO of HR software giant Workday. Read the issue now.

    Download

  • Lower your TCO with serverless applications

    Serverless applications can save up to 68 percent of development costs by automatically allocating compute on a pay-for-use basis. Read the Deloitte whitepaper Determining the Total Cost of Ownership: Comparing Serverless and Server-based Technologies to learn more.

    Download

  • IT in Europe - May 2012

    While network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.

    Download

  • Computer Weekly – 9 August 2016: Will Rio's 4G sink or swim?

    The Rio Olympic games are meant to be the fastest Games ever – not just for the athletes, but also for mobile data speeds. Users will want to upload photos and videos in real time. In this week's Computer Weekly, we investigate how operators are working round Brazil's patchy 4G. We also find out how Glasgow's smart city initiatives are evolving.

    Download

  • HITRUST CSF Certification: Most commonly asked questions

    The HITRUST Common Security Framework (CSF) was developed by IT and healthcare professionals to provide a framework for managing the security requirements inherent in the Health Insurance Portability and Accountability Act (HIPAA). Find more about some of the answers to the most common questions in this document.

    Download

  • AWS Re:Invent 2019: What CIOs need to know from this year's show

    The Amazon Web Services (AWS) Re:Invent user conference saw 65,000 users, developers and business leaders convene in Las Vegas to hear news about the firm's innovation priorities. In this e-guide, we provide a round-up of all the big stories and announcements from this year's Re:Invent, and give readers some clues as to where AWS is heading next.

    Download

  • CW APAC - February 2022: Trend Watch - enterprise 5G

    In this handbook, focused on enterprise 5G in the Asia-Pacific region, Computer Weekly looks at what the technology means for enterprises across the region.

    Download

  • CW Middle East - July-September 2022: UAE citizens embrace new digital technologies

    A survey shows that people in the United Arab Emirates believe next-generation technologies such as 3D printing and artificial intelligence will become widespread in the country. Also read how the UAE has improved its security posture amid mounting cyber threats.

    Download

  • The changing mobile platform landscape

    So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.

    Download

  • IT Handbook: Security Best Practices for Server Virtualization

    Without the right plan for managing security, much of your proprietary data and  information is at great risk. Access this expert resource, from the editors at SearchServerVirtualization.com, to learn the essential best practices for maintaining security in your virtualized data center.

    Download

  • eGuide: Expert Tips for Deploying Secure Messaging Technologies

    This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.

    Download

  • Uncover your security gaps with IBM

    To defend your business against evolving cyberthreats, you must first understand your security gaps, strengths and weaknesses. A cyber resiliency assessment can help you develop that understanding. Learn about a free assessment in this overview.

    Download

  • Strategies for Building a Private Cloud

    While the cloud can offer many benefits, IT professionals are still hesitant to transition their computing environments with all the complexities involved. This expert e-zine discusses current cloud trends, the benefits of taking the plunge, and tools you can leverage to ease the extensive process so you don’t have to lag behind.

    Download

  • Computer Weekly – 30 August 2016: Get protected

    It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.

    Download

  • Royal Holloway: Security evaluation of network traffic mirroring in public cloud

    This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.

    Download

  • Computer Weekly Buyer's Guide to services for digitisation and IoT

    In this 13-page buyer's guide, Computer Weekly looksat the use of mid-sized nearshore IT service providers, choosing a cloud-based platform, and how to manage the huge volume of IoT data.

    Download

  • A Computer Weekly buyer's guide to the circular economy

    Increasing environmental concerns have made companies consider the circular economy model. In this 17page buyer's guide, Computer Weekly looks at how organisations can become more sustainable, whether Amazon's server pledge will catch on and how CIOs can adapt their procurement strategies to fight climate change.

    Download

  • How you can maximize your employee’s lifetime value

    When it comes to the employee lifecycle that starts with being hired to their last day, it’s important to ensure the employee is delivering value throughout their tenure. To achieve this, it all starts with the People, or HR team. With the right people practices, it’s easy to keep your employees productive and engaged. Read on to learn more.

    Download

  • A Computer Weekly buyer's guide to blockchain technology

    Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.

    Download

  • Modern Infrastructure: November 2012

    November's edition of Modern Infrastructure e-zine offers advice on the current trends in the modernized data center including information on migrating legacy applications, advanced public cloud offerings, BYOD, and software-defined networking.

    Download

  • A Computer Weekly buyer's guide to network upgrades for cloud-native infrastructure

    With enterprises increasingly turning to digitisation and cloud computing, there is renewed interest in networking and a greater need for agility. In this 15-page buyer's guide, Computer Weekly looks at what IT decision-makers should be thinking about in their adoption of cloud-native applications.

    Download

  • Sandnet++ – A framework for analysing and visualising network traffic from malware

    This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware

    Download

  • Computer Weekly – 12 February 2019: The Met Office storms ahead on data analytics

    In this week's Computer Weekly, find out how the Met Office takes 2TB of weather data every hour and turns it into useful business insight. We examine whether Amazon's presence in the retail market is putting off other retailers from using its public cloud services. And we look at the new 802.11ax wireless networking standard. Read the issue now.

    Download

  • Top 10 Australia IT stories of 2018

    In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at what the country is doing to cement its position as a leader in mastering and deploying advanced information and communications technology across a large segment of its economy.

    Download

  • A Computer Weekly Buyer's Guide to Internet of Things Security

    In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.

    Download

  • CW ASEAN – December 2018: How to make the right cloud infrastructure choices

    In this month's edition of CW ASEAN, we take a look at the considerations when choosing infrastructure as a service, and what needs to be in place for enterprises to get the most out of the cloud computing technology

    Download

  • E-Book: Definitive Guide to Exchange 2010 Migration Chapter 4: Load Testing and Security Exchange 2010

    This chapter explains how to test Exchange 2010 with native and third-party management tools and how best to protect your investment.

    Download

  • Software-Defined Networks and the New Network Hypervisor

    This issue of the Network Evolution E-Zine focuses on various SDN solutions, if it's the answer to the bottleneck problem, and potential pitfalls. Read this issue now to see what experts have to say about the possible SDN revolution.

    Download

  • Network Evolution: Software defined networks and the new network hyper-visor

    This expert resource puts SDN under the microscope, examining the impact that the technology can have on your environment, along with how your peers are utilizing it. Read on to find out whether SDN is really worth the hype that is building around it.

    Download