EZINE:
In this week's Computer Weekly, we examine the considerable environmental footprint of the mobile phone industry and ask what can be done to improve it. We find out how disaster recovery as a service (DRaaS) is being used and when it's an option for businesses. And we look at some of the UK's emerging fintech success stories. Read the issue now.
EZINE:
In this week's Computer Weekly, after the UK celebrated 100 years of women's suffrage, we look at what more needs to be done to encourage greater diversity in IT to help tackle the ongoing skills shortage. We examine how mobile app developers can improve security. And we look at the role of containers in storage architecture. Read the issue now.
EDITORIAL RESOURCE GUIDE:
Despite the fears of many that rollouts of the next generation infrastructure would be delayed or just not be possible due mainly to the adverse economic conditions caused by Covid-19, the prospects are actually quite bright for the 5G industry in 2021.
EGUIDE:
Becoming more digital has emerged as a ruling concept among forward-looking organisations in recent years. Now, while having multi-channel engagement with customers is a big aspect of digital, so too is attracting and retaining the employees who can make a reality of digital transformation.
EZINE:
Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.
EZINE:
In a country like Sweden which has embraced IT to transform life and work and where concepts like cashless society are welcomed by many, the proliferation of artificial intelligence is inevitable.
EGUIDE:
In an era of mobile everything, mobile security threats are on the rise and security is becoming increasingly important. Discover the top 5 mobile security threats that should be on your radar and the benefits of security solutions like two-factor authentication.
EGUIDE:
Unified workspaces have many advantages and allow users to work with the devices and resources they prefer, but they also introduce a number of complexities for IT. In this e-guide you'll uncover how to address these complexities and undergo a successful digital workplace transformation.
EGUIDE:
In this e-guide, learn about innovation in software-defined networking and network functions virtualization technologies for next-generation networks, and one IT pro's strategies for improving Wi-Fi in a device-saturated dormitory.
EBOOK:
In our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more.