EBOOK:
In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.
EZINE:
As telcos gear up to roll out the first 5G networks, enterprises are keen to see how they can take advantage of faster 5G networks to support a broad range of applications. In this edition of CW ASEAN, we look at how enterprises in ASEAN are readying themselves for 5G to take advantage of the new technology. Read the issue now.
EBOOK:
This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
EZINE:
Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.
EZINE:
Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.
EZINE:
In this month's MicroScope, we look at why customers should be prepared to pay for the value offered by a managed service provider, identify the biggest drivers in the data storage market, and look at why some firms are struggling to get to grips with remote working. Read the issue now.
EZINE:
Pokémon Go brought augmented reality technology to the masses. Now, businesses can take advantage of AR to get more insight into users' activities and needs.
EZINE:
Technology budgets are tight, yet businesses still expect IT to increase their ROI. But end-user computing tools don't always rake in big bucks. Instead the ROI comes from increased productivity and simpler management and maintenance for IT administrators. Discover the ROI businesses can get from these technologies and how to measure it.
EBOOK:
Download this handbook to learn how EMM tools have changed with the market, and use this guide as a way to craft the best mobility strategy for your organization.
EBOOK:
In our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more.