EZINE:
It's been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time.
EZINE:
In this week's Computer Weekly, the proliferation of ethical frameworks has done little to change how artificial intelligence is developed – we look at the challenges. We examine the future of the UK semiconductor sector as the government launches a review. And we hear how NatWest has put data at the heart of customer strategy. Read the issue now.
EGUIDE:
The threat of the paperless office is as far away as ever and for now there are plenty of choices for those looking to sell printer technology. This guide will provide an update on some of the recent activities by vendors on the hardware front as well as looking into the managed print service world.
WHITE PAPER:
Take a look at this exclusive white paper to find out how you can utilize key factors of migration from GroupWise to Office 365, to propel yourself through a successful transition process.
EZINE:
Consumerisation of IT in the ASEAN regionMobile devices are being used by staff in their work environment. So much so that businesses can no longer ignore it.
VIRTUAL ENVIRONMENT:
This personal advisor tool from Dell is designed to help you define your unique system configurations in order to find the best hardware solution available for your organization.
WHITE PAPER:
Take a look at this exclusive resource to find out how HP's new approach to infrastructure management can help you save time and money when confronting data center challenges.
EGUIDE:
The rise of flash storage and convergence technologies make it tougher to see storage and servers as separate entities in a software-defined world. Rich Castagna, VP of Editorial at TechTarget, shares why he believes servers and storage have become inextricably linked.
EGUIDE:
In this e-guide, IT security pro Nick Lewis discusses the evolving security threat posed by embedded systems on standard enterprise networks, including some recent printer security vulnerabilities. Learn about potential mitigations you can put in place, and get bonus tips on keeping data safe in recycled PC components.