RESOURCE:
This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
RESEARCH CONTENT:
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
ESSENTIAL GUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of May over the past five decades.
INFOGRAPHIC:
Before implementing Enterprise Content Management, it's important for organizations to develop an ECM roadmap or strategy to identify the top priorities and get clarity on the necessary procedures and technologies it entails. This infographic outlines the steps to successfully implement an ECM system.
ESSENTIAL GUIDE:
This guide to managing application performance covers transaction speeds, networking, workflow and tools for performance detection and diagnosis.
EGUIDE:
In this e-guide, read more about the trends that are shaping the demand for AI and how organizations including healthcare service providers and F1 racing teams are leveraging technology on their own terms.
EZINE:
In this week's Computer Weekly, we examine the mingling of virtual and physical worlds and find positive applications and worrisome implications from augmented reality. We find out how to run a virtual hackathon during the pandemic – pizza still included. And we look at how to improve performance of your private cloud. Read the issue now.
EBOOK:
Download this expert handbook to uncover several new forms of technology that are integral to the intelligent enterprise and learn how these tools can help to boost employee experience and give your organization a competitive advantage.
EBOOK:
In the rush to implement DevOps, security is too often overlooked. But DevSecOps is essential in these hack-filled days. Learn how you can add security to software development today.
EGUIDE:
In this expert e-guide, Tom Nolle examines what it takes to create effective app testing and ALM techniques for cloud development. From test data management to horizontal integration, explore the key considerations for app testing in the cloud, and discover tips on what to look for when buying app testing and ALM tools.