EGUIDE:
Two decades ago, at the start of the millennium, IT was deeply concerned about Y2K – and the iPhone, Twitter and Facebook didn't exist. So what's in store as a new decade begins?
EZINE:
Digital transformation is the buzz phrase, but is it more a question of evolution? In this issue, experts weigh in on digitisation and its effect on the world of work. Also read about local broadband providers aiming to improve internet connection and productivity, and find out how to tackle sales in a post-pandemic landscape
EZINE:
In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access
EZINE:
Russian mobile operators are pooling their resources to help them overcome the technical challenges of creating 5G networks. Also read how Swedbank is rebuilding its anti-money laundering systems after a damning report, and how a public-private partnership in the Netherlands is helping to combat cyber fraudsters.
ESSENTIAL GUIDE:
This guide from Vodafone explains how to introduce flexible working, what technologies to consider and how to succeed at implementation.
EZINE:
In this week's Computer Weekly, we go behind the scenes at London Gatwick Airport and talk to its CIO about a critical network upgrade to support passenger growth. Our latest buyer's guide examines automation and intelligent systems management. And we assess the latest technologies for boosting storage performance. Read the issue now.
EGUIDE:
In this case study, learn how India's largest telecom operator built its own machine learning platform to meet the growing data and signalling requirements of new networks.
EGUIDE:
The Covid-19 pandemic has transformed our networking habits. In this 17-page buyer's guide, Computer Weekly looks at how firms are coping with the shift to remote working, the new challenges facing IT leaders and the alternatives to strained virtual private networks.
EGUIDE:
Endpoint security has become an especially hot topic over the past few months. Organizations need to put clamps on hackers who attempt to breach their infrastructure. As such, traditional legacy endpoint security systems may not be able to stand up to modern threats. Read this expert guide to learn about endpoint detection & response.