Software Research
-
Software licensing – battleground or crucible?
Sponsored by: TechTarget ComputerWeekly.comWill software licensing continue to be a battleground for suppliers and users, or can new, mature relationships between the two sides be forged in the digital crucible of contemporary on-demand, pay as you go software?
-
Your guide to the open source universe
Sponsored by: TechTarget ComputerWeekly.comOpen source used to be an alternative to commercial off –the-shelf software. Today, the largest commercial software providers are big supporters of open source technologies.
-
Blockchain Enterprise Survey: deployments, benefits and attitudes
Sponsored by: TechTarget ComputerWeekly.comBlockchain deployments are rapidly becoming mainstream. Nearly 40% of respondents' companies are deploying blockchain technology, rising to 57% amongst companies with over 20,000 employees. In part, this is due to increased awareness and understanding of what blockchain entails, particularly at Founder/CEO level.
-
Next step app development: Microservices
Sponsored by: TechTarget ComputerWeekly.comAdopting a microservices approach to application development is increasingly considered an essential part of any bid to modernise the legacy IT setup an organisation relies on.
-
Next stage of virtualisation: Containers
Sponsored by: TechTarget ComputerWeekly.comThe buzz and hype surrounding container technologies has reached fever pitch in recent years, prompting CIOs and IT decision makers to mull over what role, if any, they should and could play in their digital transformation plans.
-
A Computer Weekly Buyer's Guide to Mobile App Development
Sponsored by: TechTarget ComputerWeekly.comThis Computer Weekly buyer's guide looks at how to take an Agile approach to mobile app development. Discover how to gain a competitive edge by accelerating mobile development, turning mobile users' expectations to your advantage, and building unique, differentiated mobile experiences.
-
Using IT initiatives to save money and reinforce green credentials
Sponsored by: TechTarget ComputerWeekly.comAnalyst Group Quocirca explains how organisations can use web data caching software to save money and improve their green credentials.
-
Computer Weekly – 8 November 2016: The march of the robot workers
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.
-
Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.
-
CW500: A roadmap to software-defined everything – Paddy Power Betfair
Sponsored by: TechTarget ComputerWeekly.comComputer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything - this presentation was given by Steven Armstrong, principal automation engineer at Paddy Power Betfair.
-
CW500: A roadmap to software-defined everything – Morgan Stanley
Sponsored by: TechTarget ComputerWeekly.comComputer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything – this presentation was given by Rob White, executive director of the global database group at Morgan Stanley.
-
Computer Weekly – 4 October 2016: How Microsoft aims to tackle information overload
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the firm wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer's guide looks at network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.
-
Raspberry PI with Java: programming the internet of things
Sponsored by: TechTarget ComputerWeekly.comIn this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
-
Application Modernisation: The Essential Guide
Sponsored by: TechTarget ComputerWeekly.comIn this guide, we look at how distributed systems have evolved to support more agile software development.
-
Computer Weekly 50th anniversary special
Sponsored by: TechTarget ComputerWeekly.comIt's been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time.
-
First edition of Computer Weekly 1966
Sponsored by: TechTarget ComputerWeekly.comTo celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.
-
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
-
Computer Weekly@50: What was happening in July
Sponsored by: TechTarget ComputerWeekly.comThe National Museum of Computing has again been looking into Computer Weekly's 50 years of magazine issues for another selection of articles highlighting significant news published in the month of July over the past five decades.
-
Enterprise cloud applications – can we trust them?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
-
CW@50: What was making the news in June
Sponsored by: TechTarget ComputerWeekly.comThe National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
-
CW@50 - What was making the news in May
Sponsored by: TechTarget ComputerWeekly.comThe National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of May over the past five decades.
-
CW@50: March editions of Computer Weekly
Sponsored by: TechTarget ComputerWeekly.comWe search back through the Computer Weekly archives held at The National Museum of Computing to present what was happening in IT over the past five decades.
-
Does a proprietary solution automatically mean vendor lock-in?
Sponsored by: TechTarget ComputerWeekly.comThe dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?
-
Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
Sponsored by: Imperva.This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
-
Virtual Data Center eZine - Vol.5
Sponsored by: Dell CompellentAccording to the Data Center Decisions 2008 Purchasing Intentions Survey, server selection and disaster recovery (DR) are front-burner issues for data center decision makers.