INFOGRAPHIC:
As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
EZINE:
In this week's Computer Weekly, we talk to the technology team behind a project to recreate the voyage of the Mayflower using a fully autonomous ship. We look at how India's coronavirus lockdown is affecting UK companies that use offshore outsourcing. And we examine the challenges of making edge computing work. Read the issue now.
EZINE:
In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.
EGUIDE:
The Computer Weekly Developer Network is in the engine room, covered in grease and looking for Artificial Intelligence (AI) tools for software application developers to use. With so much AI power in development and so many new neural network brains to build for our applications, how should programmers 'kit out' their AI toolbox?
EZINE:
In this week's Computer Weekly, we talk to NHS Digital about how technology is supporting the health service's response to the coronavirus crisis. We examine the challenges of running a successful security operations centre. And we look at the emerging datacentre architecture based on composable infrastructure. Read the issue now.
EGUIDE:
Kubernetes has rested comfortably at the top of the pile for container management for a few years now. However, other vendors are shaking things up. In this E-Guide, learn about the top 5 trends in container management in the coming year. Download the guide now to see how the hierarchy could change.
EGUIDE:
Whether you are a developer, a tester, or a user experience professional, this E-Guide can help shed some light on how to adopt DevOps in your organization, and some of the effects you can expect to see. Also learn opportunities to get involved with the DevOps adoption on your team and how your role can impact a smooth transition.
EGUIDE:
As cloud-native technologies continue their rise to the top of the market, enterprises are investing in cloud monitoring tools instead of building the cheaper homegrown systems that early adopters favored. Download this exclusive e-Guide to learn more about the move reflected a broadening scope for tools to monitor complex IT environments.
EZINE:
In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.
EGUIDE:
If it can't be measured, it can't be managed. Telemetry on applications and IT infrastructure are key to keeping applications running optimally and reducing unplanned downtime. Beyond using telemetry data to respond to abnormal events, historical data analysis can reveal more systemic issues. In this e-guide we look at trends in APM.