ComputerWeekly.com Research Library

Powered by Bitpipe.com

Software Research

  • Gamma International: The Macedonia files

    Sponsored by: TechTarget ComputerWeekly.com

    This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.

  • CW Nordics November 2017

    Sponsored by: TechTarget ComputerWeekly.com

    The Nordic countries are pace-setters when it comes to digital transformation and although there is a wealth of IT talent in the region, it seems it is not enough.

  • Computer Weekly – 7 November 2017: The ethics of software development

    Sponsored by: TechTarget ComputerWeekly.com

    Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.

  • Computer Weekly – 17 October 2017: Microsoft CEO Satya Nadella on empathy and innovation

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, Microsoft CEO Satya Nadella explains why he has made empathy a key part of technology innovation. We examine the latest news in the ongoing debate over the tax status of IT contractors in the public sector. And we ask if an emphasis on creativity will help attract more young people to work in IT. Read the issue now.

  • Computer Weekly – 19 September 2017: Can DevOps deliver on its productivity promises?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, DevOps is cited as a key element of digital transformation – we examine the challenges to delivering on its promise. Many retailers are investing in emerging technologies to gain an edge – but are they too far ahead of the curve? And could a new spirit of collaboration help UK broadband roll-out? Read the issue now.

  • Software licensing – battleground or crucible?

    Sponsored by: TechTarget ComputerWeekly.com

    Will software licensing continue to be a battleground for suppliers and users, or can new, mature relationships between the two sides be forged in the digital crucible of contemporary on-demand, pay as you go software?

  • Your guide to the open source universe

    Sponsored by: TechTarget ComputerWeekly.com

    Open source used to be an alternative to commercial off –the-shelf software. Today, the largest commercial software providers are big supporters of open source technologies.

  • Blockchain Enterprise Survey: deployments, benefits and attitudes

    Sponsored by: TechTarget ComputerWeekly.com

    Blockchain deployments are rapidly becoming mainstream. Nearly 40% of respondents' companies are deploying blockchain technology, rising to 57% amongst companies with over 20,000 employees. In part, this is due to increased awareness and understanding of what blockchain entails, particularly at Founder/CEO level.

  • Next step app development: Microservices

    Sponsored by: TechTarget ComputerWeekly.com

    Adopting a microservices approach to application development is increasingly considered an essential part of any bid to modernise the legacy IT setup an organisation relies on.

  • Next stage of virtualisation: Containers

    Sponsored by: TechTarget ComputerWeekly.com

    The buzz and hype surrounding container technologies has reached fever pitch in recent years, prompting CIOs and IT decision makers to mull over what role, if any, they should and could play in their digital transformation plans.

  • A Computer Weekly Buyer's Guide to Mobile App Development

    Sponsored by: TechTarget ComputerWeekly.com

    This Computer Weekly buyer's guide looks at how to take an Agile approach to mobile app development. Discover how to gain a competitive edge by accelerating mobile development, turning mobile users' expectations to your advantage, and building unique, differentiated mobile experiences.

  • Using IT initiatives to save money and reinforce green credentials

    Sponsored by: TechTarget ComputerWeekly.com

    Analyst Group Quocirca explains how organisations can use web data caching software to save money and improve their green credentials.

  • Computer Weekly – 8 November 2016: The march of the robot workers

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.

  • Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.

  • CW500: A roadmap to software-defined everything – Paddy Power Betfair

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything - this presentation was given by Steven Armstrong, principal automation engineer at Paddy Power Betfair.

  • CW500: A roadmap to software-defined everything – Morgan Stanley

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything – this presentation was given by Rob White, executive director of the global database group at Morgan Stanley.

  • Computer Weekly – 4 October 2016: How Microsoft aims to tackle information overload

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the firm wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer's guide looks at network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.

  • Application Modernisation: The Essential Guide

    Sponsored by: TechTarget ComputerWeekly.com

    In this guide, we look at how distributed systems have evolved to support more agile software development.

  • Raspberry PI with Java: programming the internet of things

    Sponsored by: TechTarget ComputerWeekly.com

    In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.

  • Computer Weekly 50th anniversary special

    Sponsored by: TechTarget ComputerWeekly.com

    It's been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time.

  • First edition of Computer Weekly 1966

    Sponsored by: TechTarget ComputerWeekly.com

    To celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.

  • Computer Weekly@50: What was happening in July

    Sponsored by: TechTarget ComputerWeekly.com

    The National Museum of Computing has again been looking into Computer Weekly's 50 years of magazine issues for another selection of articles highlighting significant news published in the month of July over the past five decades.

  • Enterprise cloud applications – can we trust them?

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.

  • The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.

  • CW@50: What was making the news in June

    Sponsored by: TechTarget ComputerWeekly.com

    The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.