EZINE:
In this week's Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the firm wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer's guide looks at network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.
ESSENTIAL GUIDE:
This guide to managing application performance covers transaction speeds, networking, workflow and tools for performance detection and diagnosis.
EZINE:
Software-defined storage (SDS), which promises greater transparency and control over data, is an increasingly important tool in the enterprise technology armoury. In this issue of CW ANZ, we look at how Australian enterprises are turning to SDS to improve data management and direct data to different tiers of storage or to applications.
EGUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
EGUIDE:
Open source used to be an alternative to commercial off –the-shelf software. Today, the largest commercial software providers are big supporters of open source technologies.
WHITE PAPER:
Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
EZINE:
In this week's Computer Weekly, we detail the concerns of IT experts about the UK's Online Safety Bill's proposals to weaken end-to-end message encryption. Our buyer's guide continues to look at the issues around integrating SaaS applications, with a particular eye to the proliferation of SaaS during the Covid pandemic. Read the issue now.
WHITE PAPER:
Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.