Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10"
-
Computer Weekly – 24 January 2017: World leaders discuss risks of social unrest from advances in technology
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the fears raised at the World Economic Forum over the potential for social unrest as technology transforms working practices. We hear from the CIO at the World Health Organization about how IT helped tackle the Ebola crisis. And we look at progress in adopting big data analytics. Read the issue now.
-
Royal Holloway: Information security of the 2016 Philippine automated elections
Sponsored by: TechTarget ComputerWeekly.comWe analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
-
MicroScope – July 2020: MSPs lend a helping hand
Sponsored by: MicroScopeIn this issue, read about how the Covid-19 pandemic has allowed for managed services players to show their worth, and discover how the use of collaborative tools has made businesses consider how to make conference calls more engaging
-
A Computer Weekly buyer's guide to application modernisation
Sponsored by: TechTarget ComputerWeekly.comIn this 15-page buyer's guide, Computer Weekly investigates how organisations are approaching the modernisation, replatforming and migration of legacy applications. We look at the tools and technologies available, change management, and the use of APIs and containerisation to make legacy functionality to cloud-native applications.
-
Computer Weekly – 22 January 2019: Moving beyond network boundaries
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.
-
CW Benelux - May 2020: IT budgets up in the air as Covid-19 disrupts business
Sponsored by: TechTarget ComputerWeekly.comComputer Weekly's annual IT priorities survey was carried out before the arrival of Covid-19 disrupted business plans. It found that more than half of the IT leaders in the Benelux region expected budgets to be higher this year than last, and digital transformation was to be the main recipient of budget increases.
-
CW Nordics - November 2022 - January 2023: Icelandic datacentres point way to greener IT
Sponsored by: TechTarget ComputerWeekly.comIceland may soon become even more attractive to firms wanting to minimise their carbon footprint while using high-performance computing services. Read more about it in this issue. Also find out how a robo investment company, Nord Investments, is harnessing open banking to make thing easier for its clients.
-
Computer Weekly – 7 February 2017: Computer power pushes the boundaries
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the ways chip engineers are looking beyond silicon to keep pushing the limits of Moore's Law. We find out about serverless computing and how it could deliver what many firms want from the cloud. And we look at the importance of culture change to digital transformation. Read the issue now.
-
Computer Weekly – 14 May 2019: The startups transforming data analytics
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we travel to Silicon Valley to meet the emerging tech startups hoping to take data analytics to a new level. The NHS desperately needs to recruit IT professionals – we look at the job opportunities. And we examine the best ways to keep cloud costs under control. Read the issue now.
-
Time to Adapt: The State of Human Risk Management in 2024
Sponsored by: CultureAIAs the threat landscape evolves, companies must adopt a proactive, data-driven approach to human risk management. This white paper explores the limitations of security awareness training and the benefits of leveraging human risk management solutions to strengthen organizational security. Read the full white paper to learn more.