EZINE:
Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.
EGUIDE:
Will software licensing continue to be a battleground for suppliers and users, or can new, mature relationships between the two sides be forged in the digital crucible of contemporary on-demand, pay as you go software?
EBOOK:
In this 13-page buyer's guide, Computer Weekly looks at how the architectures are configured, the suppliers building them – and the benefits to the organisation using them.
EZINE:
In this week's Computer Weekly, we look at one of the oldest pain points for IT departments – software patching – and ask how to make it less complex across the enterprise. We examine the rise of Kubernetes, the open source container system. And we look at storage strategy to support a multicloud environment. Read the issue now.
WHITE PAPER:
Companies must adapt their management practices to provide proper control over resources in the cloud. This white paper showcases a management tool designed with these types of environments in mind and discusses its key features and benefits.
EGUIDE:
What are the first steps to creating a strong app security program, and how do you know you've struck the right balance between static and dynamic testing? These are the types of questions we explore in this e-guide. Find out what role education is playing in building an app security program and get advice for mitigating SAP vulnerabilities.
EZINE:
In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.
EGUIDE:
In this expert e-guide, we examine the different approaches to app modernization, including how to leverage the third platform, redesign cloud-native apps, and couple modernization efforts with PaaS. Find out how each of these approaches makes integrating the cloud into your architecture and updating legacy apps an easier, more streamlined process.
EBOOK:
The upsurge in cloud computing presents development teams with challenges that may require them to rethink established ways of building applications. Read this e-book, which discusses languages for cloud computing, distributed caching, scaling horizontally, and changing data architectures midcloud, for further discussion of these issues.
EGUIDE:
In this e-guide, Gartner analyst Dale Vecchio reveals 3 primary approaches to legacy app modernization. Plus, learn approaches for incorporating mobile apps as part of your legacy system modernization effort.