EBOOK:
The way we work is changing with the exponential emergence of new technology. In this 15-page buyer's guide, Computer Weekly looks at the potential of DNA storage, how we can benefit from quantum computing in the future and the role of software in business development.
EZINE:
Traditional disks can no longer keep up with the needs of modern enterprises. In this issue of CW ASEAN, we take a look at how enterprises are taking to all-flash array storage, and what they need to do to lay the foundation necessary for getting the most out of the technology. Read the issue now.
RESEARCH CONTENT:
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
EGUIDE:
In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.
INFOGRAPHIC:
Before implementing Enterprise Content Management, it's important for organizations to develop an ECM roadmap or strategy to identify the top priorities and get clarity on the necessary procedures and technologies it entails. This infographic outlines the steps to successfully implement an ECM system.
EGUIDE:
The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.
EGUIDE:
Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.
EZINE:
In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.
EZINE:
In this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption
EZINE:
In this week's Computer Weekly, 15 years since we first revealed the plight of subpostmasters, and four years since their High Court victory, the UK public and government are getting behind the victims, thanks to a TV dramatisation of the scandal. We look at plans to quash convictions and analyse Fujitsu’s role in the scandal. Read the issue now.