RESEARCH CONTENT:
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
EBOOK:
The way we work is changing with the exponential emergence of new technology. In this 15-page buyer's guide, Computer Weekly looks at the potential of DNA storage, how we can benefit from quantum computing in the future and the role of software in business development.
EGUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
EZINE:
In this week's Computer Weekly, we talk to snack giant Mondelez, the owner of Cadbury, about how AI and data are transforming its business. SAP is increasing support costs for the first time in years – we assess the impact on customers. And a Ukrainian tech CEO tells us how his company kept going despite the Russian invasion. Read the issue now.
EZINE:
In this week's Computer Weekly, we look at one of the oldest pain points for IT departments – software patching – and ask how to make it less complex across the enterprise. We examine the rise of Kubernetes, the open source container system. And we look at storage strategy to support a multicloud environment. Read the issue now.
EZINE:
In this week's Computer Weekly, we visit a Tokyo project where artificial intelligence is helping to improve road safety by detecting potential subsidence. As bug bounty programmes become popular, we look at what's involved and the pitfalls to beware. And we discuss digital development in healthcare with NHS England. Read the issue now.
WHITE PAPER:
Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
EGUIDE:
In this expert e-guide, we explore how to simplify your cloud app experience with technologies like Azure. Find out how to improve cloud development initiatives, and delve down into topics like cloud services for serverless computing, AI, and containers.
EZINE:
In this week's Computer Weekly, 15 years since we first revealed the plight of subpostmasters, and four years since their High Court victory, the UK public and government are getting behind the victims, thanks to a TV dramatisation of the scandal. We look at plans to quash convictions and analyse Fujitsu’s role in the scandal. Read the issue now.