EZINE:
In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.
WHITE PAPER:
This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
CASE STUDY:
Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.
EZINE:
In this week's Computer Weekly, we talk to Disney Advertising Sales about how it is using data to subserve story-telling excellence. We delve into how rising energy costs negatively impacted the the UK arm of Sungard Availability Services. And we look at the role of infrastructure as code in edge datacentres. Read the issue now.
EZINE:
The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.
EZINE:
In this issue of CW Middle East, read how the UAE and the Abu Dhabi National Oil Company have recognised that things will change as oil and gas resources dwindle. Digital technology, such as artificial intelligence, has been identified as a key driver for future industries.
PRODUCT OVERVIEW:
Automation is a top business initiative for 60% of organizations. In this product overview, discover 5 ways you can use Red Hat Ansible Automation Platform to simplify your company’s automation management efforts.
EZINE:
In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.
EGUIDE:
The better the working conditions of a software developer, the better the results. In this 15-page buyer’s guide, Computer Weekly looks at how to improve productivity, the tools required to build success and the value of in-house expertise.