EGUIDE:
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
ESSENTIAL GUIDE:
In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
EBOOK:
The way we work is changing with the exponential emergence of new technology. In this 15-page buyer's guide, Computer Weekly looks at the potential of DNA storage, how we can benefit from quantum computing in the future and the role of software in business development.
EGUIDE:
In this infographic, we shine a light on our 2019 IT Priorities survey results. Discover what IT departments are investing in and how much budgets are increasing by. Taken from a study of 151 respondents from across Middle East.
EZINE:
In this week's Computer Weekly, we look back at the UK government's AI Safety Summit and assess what it achieved – and what it didn't. Our latest buyer's guide examines the future of business software and modernising legacy applications. And we find out how the UK PSTI Act aims to protect your smart devices. Read the issue now.
EGUIDE:
Blockchain deployments are rapidly becoming mainstream. Nearly 40% of respondents' companies are deploying blockchain technology, rising to 57% amongst companies with over 20,000 employees. In part, this is due to increased awareness and understanding of what blockchain entails, particularly at Founder/CEO level.
EZINE:
Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.
WHITE PAPER:
Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
EZINE:
In this week's Computer Weekly, 15 years since we first revealed the plight of subpostmasters, and four years since their High Court victory, the UK public and government are getting behind the victims, thanks to a TV dramatisation of the scandal. We look at plans to quash convictions and analyse Fujitsu’s role in the scandal. Read the issue now.
EZINE:
In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.