EZINE:
In this week's Computer Weekly, we talk to the BBC about how the UK broadcaster is using data analytics to better understand its viewers and grow its audience. We look at how CERN is using IT automation in its quest to unravel the mysteries of the universe. And we examine the impact of GDPR on cloud storage. Read the issue now.
RESOURCE:
This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
RESEARCH CONTENT:
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
EGUIDE:
Will software licensing continue to be a battleground for suppliers and users, or can new, mature relationships between the two sides be forged in the digital crucible of contemporary on-demand, pay as you go software?
EZINE:
In this week's Computer Weekly, we visit the first hackathon at Abbey Road Studios, once home to The Beatles, to find out how tech startups hope to revolutionise music creation. Our latest buyer's guide looks at perimeterless network security. And we look ahead to the key CIO skills and jobs trends for 2019. Read the issue now.
EZINE:
In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.
EZINE:
In this week's ezine, as SAP users prepare for the deadline to move off the ECC platform, we find out how Co-op is migrating to S/4Hana. Our latest buyer's guide looks at how to manage SaaS and on-premise software licensing. And we talk to former NCSC CEO Ciaran Martin about the true risks of nation-state cyber attacks. Read the issue now.
WHITE PAPER:
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.