EZINE:
In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.
EGUIDE:
In this e-guide, read about the state of adoption of Software-defined networking (SDN) in the ASEAN, how the technology can be used to secure critical systems and what you can do to get started.
EBOOK:
In this week's Computer Weekly, as CIOs come to terms with the Meltdown and Spectre processor flaws that make every computer a security risk, we examine how to protect your IT estate. We find out how Alexa-style smart speakers can help with CRM strategies. And we look at how the public sector is implementing DevOps. Read the issue now.
EBOOK:
To celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.
EGUIDE:
In these uncertain times, making solid predictions for the year ahead looks like a definition of a mug's game. While this has been the fuel for the fire for the boom in applications such as video conferencing as used to support remote working, the same really can be said for the internet of things (IoT).
EGUIDE:
Download this expert guide to learn how 1 performing arts college uses network management tools to quickly detect problems, and explore a new tool by Aerohive that integrates with Amazon Alexa and enables you to query client and network analytics, as well as accomplish routine tasks, with just your voice.
EGUIDE:
How does adopting SD-WAN affect security? Download this expert guide for tips on securing SD-WAN, and find out why security is an essential part of the migration process.
EZINE:
In this week's Computer Weekly, as the US ramps up semiconductor sanctions on China, we examine the ramifications across the tech sector. Cyber criminals are turning to new forms of encryption – we talk to the Dutch researchers trying to catch them. And we look at what cloud providers need to do to improve customer experience. Read the issue now.
EGUIDE:
This expert e-guide explores the possibilities a passive optical network or PON offers to both service providers as well as personal users. Access now to discover the key benefits PON could potentially offer to enterprises and the top factors IT managers must consider before choosing PON.
WHITE PAPER:
This white paper explores the reference architecture for a leading server solution. Learn how this architecture is designed to influence the benefits of virtualizing the underlying infrastructure and address the common problems associated with hardware sprawl.