CASE STUDY:
Integrating asset maintenance activity and equipment history in IBM Maximo with financial and planning systems is helping Tube Lines meet its financial targets, plan for long-range capital investments and improve the rail infrastructure. Read this case study now to learn more.
WHITE PAPER:
This paper discusses how to help reduce risk and successfully manage your security infrastructure through conducting vulnerability assessments, using discovery tools, adopting centralized policy setting and event correlation, and taking a cohesive approach to updating network equipment.
EGUIDE:
In this e-guide, read more about Citic Pacific Mining's success, the role of the CIO and chief digital officer at GE, and how Australia is planning to develop its digital competencies.
EGUIDE:
In this case study, learn how Zuellig Pharma is leveraging blockchain to help countries get up to speed with their vaccination programmes and counter the threat of counterfeit vaccines.
EZINE:
In this week's Computer Weekly, DevOps is cited as a key element of digital transformation – we examine the challenges to delivering on its promise. Many retailers are investing in emerging technologies to gain an edge – but are they too far ahead of the curve? And could a new spirit of collaboration help UK broadband roll-out? Read the issue now.
EZINE:
Read about Luxembourg's aim to play a larger role in the rapidly growing global financial technology market. Also find out how a Siri-like digital assistant will automate the completion of government service requests in Estonia.
EGUIDE:
Will software licensing continue to be a battleground for suppliers and users, or can new, mature relationships between the two sides be forged in the digital crucible of contemporary on-demand, pay as you go software?
EZINE:
In this week's Computer Weekly, we examine the digital transformation of retailer Majestic Wines and find out how buying rival Naked Wines led to a cloud overhaul of the firm's IT. We look at the challenges for IT managers as they prepare for the end of Windows 7 support. And our buyer's guide discusses deep learning technology. Read the issue now.
RESEARCH CONTENT:
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
EZINE:
In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.