WHITE PAPER:
This paper discusses how to help reduce risk and successfully manage your security infrastructure through conducting vulnerability assessments, using discovery tools, adopting centralized policy setting and event correlation, and taking a cohesive approach to updating network equipment.
CASE STUDY:
Integrating asset maintenance activity and equipment history in IBM Maximo with financial and planning systems is helping Tube Lines meet its financial targets, plan for long-range capital investments and improve the rail infrastructure. Read this case study now to learn more.
EZINE:
In this week's Computer Weekly, we visit the first hackathon at Abbey Road Studios, once home to The Beatles, to find out how tech startups hope to revolutionise music creation. Our latest buyer's guide looks at perimeterless network security. And we look ahead to the key CIO skills and jobs trends for 2019. Read the issue now.
EGUIDE:
Will software licensing continue to be a battleground for suppliers and users, or can new, mature relationships between the two sides be forged in the digital crucible of contemporary on-demand, pay as you go software?
EZINE:
In this week's Computer Weekly, we talk to snack giant Mondelez, the owner of Cadbury, about how AI and data are transforming its business. SAP is increasing support costs for the first time in years – we assess the impact on customers. And a Ukrainian tech CEO tells us how his company kept going despite the Russian invasion. Read the issue now.
EZINE:
In this week's Computer Weekly, the Post Office IT scandal inquiry continues to reveal shocking details – we review the latest evidence. We examine progress of the roll-out of fast broadband across the UK. And as the Online Safety Bill returns to Parliament, we look at the arguments about how to keep the internet safe. Read the issue now.
EZINE:
Traditional disks can no longer keep up with the needs of modern enterprises. In this issue of CW ASEAN, we take a look at how enterprises are taking to all-flash array storage, and what they need to do to lay the foundation necessary for getting the most out of the technology. Read the issue now.
RESEARCH CONTENT:
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
EGUIDE:
In this e-guide, read more about the trends that are shaping the demand for AI and how organizations including healthcare service providers and F1 racing teams are leveraging technology on their own terms.
EZINE:
In this week's Computer Weekly, after the storms that swept across the UK, we look at the technology behind Weather Source's meteorological data service. Oracle and SAP are battling over customers to upgrade their ERP systems to the cloud. And we report from the world's biggest retail tech show.