EGUIDE:
One of the mantras of modern enterprise application development is that business applications should be as easy to use as mass market consumer applications. Increasingly apps must be one step ahead of the user, pulling in context-specific information and providing a seamless user experience.
EGUIDE:
To get a solid understanding of how to use blockchain in an enterprise setting, CIOs must first grasp how a unit of value in a transaction moves from party A to party B. This infographic details how blockchain works from transaction initiation, through verification, all the way to delivery.
EZINE:
In this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.
EGUIDE:
As apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding
EZINE:
In this week's Computer Weekly as voice-activated smart speakers grow in popularity, we examine how IT teams can use the technology in enterprise applications. Our latest buyer's guide looks at the latest developments in CRM. And UK tech sector leaders tell Parliament why they are so worried about Brexit. Read the issue now.
RESOURCE:
This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.
EZINE:
This Computer Weekly buyer's guide looks at how to take an Agile approach to mobile app development. Discover how to gain a competitive edge by accelerating mobile development, turning mobile users' expectations to your advantage, and building unique, differentiated mobile experiences.
INFOGRAPHIC:
The cloud is central to the deployment of most applications today. But, that doesn't mean all applications use the cloud in the same way. In fact, there are several types of cloud application models. In this infographic, we compare three of the most popular models: cloud-native, cloud-based and cloud-enabled.
EZINE:
In this week's Computer Weekly, we go behind the scenes of Volkswagen's in-car software R&D centre. The UK's largest supercomputer has gone live in Cambridge – we find out how it will transform healthcare research. And we talk to DWP's digital chief about the restructuring of its IT capabilities. Read the issue now.
EGUIDE:
Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.