EZINE:
In this week's Computer Weekly, 13 years after Computer Weekly first reported on flaws in the Post Office IT system, a public inquiry finally allows victims to reveal the devastating impact on their lives. Enterprises are starting to evaluate the uses of 5G. And we look at how SMEs have turned to e-commerce after the pandemic. Read the issue now.
EZINE:
In this week's Computer Weekly, we find out how fast-food chain KFC turned to digital to survive the pandemic. Our latest buyer's guide looks at technologies to improve office productivity for home workers. And we assess the growing problem of electronic waste and how to tackle it. Read the issue now.
EZINE:
In this week's Computer Weekly, we find out how the IT team behind the 2022 Commonwealth Games in Birmingham delivered a winning performance, how the centuries-old London insurance market is going digital, thanks to Lloyd's of London, and how low-cost high street stores succumbed to the inevitable and are going online. Read the issue now.
EZINE:
In this week's Computer Weekly, we talk to Merlin Entertainments – operator of Legoland and Alton Towers – about how digital saved the company when Covid shut its theme parks. We find out how data analytics can help to track greenhouse gas emissions. And Southern Water explains how data supports vulnerable customers. Read the issue now.
EGUIDE:
Gartner analysts predict that mobile apps and Web 2.0 will be a deciding factor in 50% of your sales by 2015. In order to keep pace, your e-commerce processes need to evolve to include CRM technologies. Read on to learn what 6 factors are essential for an effective e-commerce/CRM merger.
PRESENTATION TRANSCRIPT:
Eucalyptus co-founder & CTO Rich Wolski discusses "Services as an Infrastructure" as a way in which enterprises can architect production cloud computing environments. Explore deployment strategies based on user experiences with private clouds in various enterprise settings and learn about likely future technological developments.
WHITE PAPER:
This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.