EZINE:
In this week's Computer Weekly, we examine how the Crown Prosecution Service is helping to digitally transform the UK justice system. We report from Google's cloud conference on the firm's plans to expand its presence in enterprise IT. And we look at the opportunities and challenges of using AI in the education sector. Read the issue now.
EZINE:
In this week's Computer Weekly, on the 50th anniversary of the Moon landings we look at the influence Apollo 11 had on modern hardware and software. Our latest buyer's guide examines data protection. And we find out how retailers with physical stores are using technology to respond to the rise of online shopping. Read the issue now.
EZINE:
Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
EZINE:
In this week’s Computer Weekly, Cabinet Office minister Francis Maude talks about releasing government datasets to the public and why open data will drive the next industrial revolution. We also review the latest test version of Windows 8 and see how it shapes up for tablet computers and business users and much more.
VIDEO:
Access this essential webcast to learn more about how the education industry is using cloud computing and virtualization. Learn how to empower your educators while creating a personalized learning environment for your students.
EBOOK:
This e-book explores the value of BI, including its return on investment, the pros and cons of purchasing versus custom-building a BI application and how recent trends are changing the BI landscape.
WEBCAST:
The digital campus on cloud demands anytime, anywhere access, scalable servers, a much, much more. To better understand the key areas of technology-driven learning, join this expert panel of educators and solutions architects as they explore the complete student life-cycle management.
WHITE PAPER:
Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.