EGUIDE:
Adopting a microservices approach to application development is increasingly considered an essential part of any bid to modernise the legacy IT setup an organisation relies on.
ESSENTIAL GUIDE:
This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
EGUIDE:
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
ESSENTIAL GUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of May over the past five decades.
EGUIDE:
Software as a service has seen a rapid increase in deployment since the pandemic. In this 15-page buyer's guide, Computer Weekly looks at the implications of its vast market, the issues it can cause through IT complexity and how to deal with SaaS governance.
EGUIDE:
Once you determine that you need to modernize certain apps, the next step is figure out which method best fits your development, whether it's restructuring with PaaS or redesigning with APIs. In this e-guide, explore how to design an app modernization strategy that suits your business's architecture and cloud use.
EBOOK:
Learn why an application modernization and digital transformation strategy can be a unique challenge to everyone, along with some common solutions.
EZINE:
In this week's Computer Weekly, we examine the minefield around datacentre planning permission across the UK, after government blocked a major development next to the M25. The metaverse is making inroads into the industrial world – is this the real future for the technology? And we analyse the trends changing the app market. Read the issue now.
EGUIDE:
The better the working conditions of a software developer, the better the results. In this 15-page buyer’s guide, Computer Weekly looks at how to improve productivity, the tools required to build success and the value of in-house expertise.
WHITE PAPER:
Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.