EZINE:
In this week's Computer Weekly, VMware users are facing licence fee increases after the acquisition by Broadcom, with education bodies worst hit – we talk to unhappy customers. Read the issue now.
EZINE:
In this week's Computer Weekly, after Birmingham City Council's disastrous Oracle project cost over £100m, we analyse where it all went wrong. Our new buyer's guide examines building a sustainable IT strategy. And we find out how Thomson Reuters is using AI to enhance its product offerings. Read the issue now.
EBOOK:
Software empowers business strategy. In this e-guide we explore how to deliver new software-powered functionality for continuous business improvement.
ESSENTIAL GUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of May over the past five decades.
EZINE:
The Nordic countries are pace-setters when it comes to digital transformation and although there is a wealth of IT talent in the region, it seems it is not enough.
EZINE:
In this week's Computer Weekly, we examine the mingling of virtual and physical worlds and find positive applications and worrisome implications from augmented reality. We find out how to run a virtual hackathon during the pandemic – pizza still included. And we look at how to improve performance of your private cloud. Read the issue now.
EGUIDE:
In this e-guide: Software for marketing, from content marketing through customer experience management to marketing automation, and the rest, has not been as central to the vision of CIOs as ERP and the full panoply of IT infrastructure: storage, security, networking, data centres, and all of the above delivered by way of the cloud.
WHITE PAPER:
Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.
WHITE PAPER:
Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.