EGUIDE:
The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.
EZINE:
In this edition of CW ANZ, we look at how enterprises are using microservices to solve problems and the challenges they are facing in moving to this new paradigm in software development. Read the issue now.
EZINE:
In this week's Computer Weekly, VMware users are facing licence fee increases after the acquisition by Broadcom, with education bodies worst hit – we talk to unhappy customers. Read the issue now.
ESSENTIAL GUIDE:
In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
EGUIDE:
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
EBOOK:
The way we work is changing with the exponential emergence of new technology. In this 15-page buyer's guide, Computer Weekly looks at the potential of DNA storage, how we can benefit from quantum computing in the future and the role of software in business development.
RESOURCE:
This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
EZINE:
An app aimed at helping dementia patients and their families has been developed by the Alzheimer Society in the Netherlands and has been welcomed with enthusiasm.
EBOOK:
Access this expert white paper to learn how your organization can best address the requirements of AI applications, 6 criteria for selecting the right AI data storage for your needs, the products that can help, and more.
WHITE PAPER:
Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.