ESSENTIAL GUIDE:
This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
RESEARCH CONTENT:
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
EBOOK:
The National Museum of Computing has again been looking into Computer Weekly's 50 years of magazine issues for another selection of articles highlighting significant news published in the month of July over the past five decades.
EGUIDE:
In this infographic, we shine a light on our 2019 IT Priorities survey results. Discover what IT departments are investing in and how much budgets are increasing by. Taken from a study of 151 respondents from across Middle East.
EGUIDE:
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
EZINE:
An app aimed at helping dementia patients and their families has been developed by the Alzheimer Society in the Netherlands and has been welcomed with enthusiasm.
EZINE:
Software-defined storage (SDS), which promises greater transparency and control over data, is an increasingly important tool in the enterprise technology armoury. In this issue of CW ANZ, we look at how Australian enterprises are turning to SDS to improve data management and direct data to different tiers of storage or to applications.
EZINE:
In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.
EZINE:
In this week's Computer Weekly, we detail the concerns of IT experts about the UK's Online Safety Bill's proposals to weaken end-to-end message encryption. Our buyer's guide continues to look at the issues around integrating SaaS applications, with a particular eye to the proliferation of SaaS during the Covid pandemic. Read the issue now.
EGUIDE:
In this expert e-guide, explore how organizations are adapting to the growing complexity of mobile app development with mobile backend as a service (MBaaS) platforms and a hybrid approach to cultivating mobile developer skills.