EGUIDE:
In this interview, Soumya Ghoshal, managing director, middle office technology, technology and operations, explains DBS Bank's credit architecture program, how it has freed up more time for relationship managers through automation, and the bank's general approach to innovation.
EGUIDE:
Database technologies have evolved over decades, from relational databases to NoSQL databases that make it easier to store & handle data in the cloud. In this e-guide, how organisations are addressing database management challenges & how Alibaba is using cloud-native databases to reduce downtime in its annual Singles' Day sales.
EZINE:
In this week's Computer Weekly, we find out why GitHub is storing its historical open source code repositories on analogue film in the Arctic Circle. Our buyer's guide examines modern software development practices. And we hear how VR technology helped the UK build more ventilators to deal with the Covid-19 pandemic. Read the issue now.
ESSENTIAL GUIDE:
Computer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything – this presentation was given by Rob White, executive director of the global database group at Morgan Stanley.
EGUIDE:
2016 is widely tipped to be the year DevOps goes mainstream, with enterprise IT managers either looking to ramp up or kick-start their efforts in this area, and start realising the benefits it can bring.
EZINE:
It's been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time.
EZINE:
In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.
INFOGRAPHIC:
There are countless open source cybersecurity tools available in the market and some of them have become essential for finding vulnerabilities in 2022. In this infographic, we highlight five tools that have proven to be highly efficient and reliable and can be combined with other tools to help build up your defences.
EZINE:
In this week's Computer Weekly, we examine the minefield around datacentre planning permission across the UK, after government blocked a major development next to the M25. The metaverse is making inroads into the industrial world – is this the real future for the technology? And we analyse the trends changing the app market. Read the issue now.