EZINE:
In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.
EGUIDE:
The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.
EBOOK:
This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
EZINE:
Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
EZINE:
In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.
PRESENTATION TRANSCRIPT:
In this transcript of a Jon Toigo video, learn about tape's usefulness in areas like disaster recovery and archiving, and learn about options for tape encryption and best practices for optimizing your tape performance.
EGUIDE:
It has been hailed as the next big thing for many years but, it is fair to say, e-health has failed to fulfill its potential. Issues around cost, ease of use and privacy have held back its adoption. Now, find out how Telefonica hopes to kick start the e-health revolution.
WEBCAST:
In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.
WHITE PAPER:
This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.