EGUIDE:
Download a copy of this expert E-Guide to learn about the latest and emerging IT ops, networking, and CMDB practices being used to tackle hybrid infrastructure management responsibilities, including a look at infrastructure-as-code (IaC) and configuration-as-code (CaC) tools.
EZINE:
In this week's Computer Weekly, 13 years after Computer Weekly first reported on flaws in the Post Office IT system, a public inquiry finally allows victims to reveal the devastating impact on their lives. Enterprises are starting to evaluate the uses of 5G. And we look at how SMEs have turned to e-commerce after the pandemic. Read the issue now.
WHITE PAPER:
Phishing scams continue to evolve, and attackers apply an ever-growing bag of tricks to fool recipients as well as email protection tools. In this edition of Understanding Phishing, the cybersecurity experts at INKY dissect a recently uncovered tactic which uses Cascading Style Sheets (CSS) to bypass security protocols by mixing scripts.
EZINE:
Thanks to an app developed in Sweden, drones can get life-saving equipment to heart-attack victims before emergency services can arrive on the scene, potentially increasing patient survival rates. Also in this issue, read about a Swedish bank's time-saving robots.
EZINE:
In this week's Computer Weekly, we're used to James Bond and his gadgets, but now MI6 is investing in tech startups to develop new intelligence capabilities. Our exclusive IT Priorities survey suggests IT leaders are optimistic about 2022. And our new buyer's guide examines the latest emerging technologies. Read the issue now.
WEBCAST:
In today’s organizations, directory structures need to be able to handle quick moves to new cloud applications and other systems. This means you need top-of-the-line identity management. Watch this webinar to get a clear-eyed view of the stresses these new requirements put on Azure AD and how Okta’s modern identity platform may be able to help.
EZINE:
Imperial College London is embarking on a three-year project with an Abu Dhabi-based group of researchers to find ways for datacentre operators and cloud providers to secure their infrastructure. Also read how Dubai is positioning itself to reap the benefits of a promising global market for drone technology.
EZINE:
In this week's Computer Weekly, after the storms that swept across the UK, we look at the technology behind Weather Source's meteorological data service. Oracle and SAP are battling over customers to upgrade their ERP systems to the cloud. And we report from the world's biggest retail tech show.
WHITE PAPER:
In this report, discover the results of Constellation Research’s initiative into determining the most effective digital tools for oversight in the enterprise and observe a shortlist of 12 unique enterprise risk management (ERM) and governance, risk and compliance (GRC) offerings you should be aware of.
EZINE:
In this week's Computer Weekly, as the Raspberry Pi reaches its 10th anniversary, we look back on how the low-cost computing device went from schools to supercomputers and even into space. Gartner offers tips on how to motivate IT staff in a hybrid working environment. And we meet the Dutch hackers helping to secure the internet.