ESSENTIAL GUIDE:
Companies that leverage data to optimise business processes will not only survive, but thrive during market downturns, and dominate the industry on the next upswing, this report from Quorum argues.
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
EZINE:
In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
EZINE:
In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.
INFOGRAPHIC:
Before implementing Enterprise Content Management, it's important for organizations to develop an ECM roadmap or strategy to identify the top priorities and get clarity on the necessary procedures and technologies it entails. This infographic outlines the steps to successfully implement an ECM system.
EGUIDE:
In the second part of our 'Future of Financial Services' e-guide series, read about how the financial services industry is not just being shaken up with cosmetic changes, but is about to go through the process of being stripped down and rebuilt.
EZINE:
We search back through the Computer Weekly archives held at The National Museum of Computing to present what was happening in IT over the past five decades.
EZINE:
In this week's Computer Weekly, we examine the minefield around datacentre planning permission across the UK, after government blocked a major development next to the M25. The metaverse is making inroads into the industrial world – is this the real future for the technology? And we analyse the trends changing the app market. Read the issue now.
WHITE PAPER:
Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
WHITE PAPER:
Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.