RESEARCH CONTENT:
In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
EZINE:
In this week's Computer Weekly, we find out how the IT team behind the 2022 Commonwealth Games in Birmingham delivered a winning performance, how the centuries-old London insurance market is going digital, thanks to Lloyd's of London, and how low-cost high street stores succumbed to the inevitable and are going online. Read the issue now.
EZINE:
In this handbook, focused on enterprise 5G in the Asia-Pacific region, Computer Weekly looks at what the technology means for enterprises across the region.
WHITE PAPER:
Small business firewall software and hardware firewalls are the methods used to protect computers against hacker attacks and other Internet threats.
EGUIDE:
Learn how Microsoft has been busy building Azure into an internet of things (IoT) platform to serve companies with connected devices. Explore the key features and challenges of this technology, and discover use cases that can provide you with better connectivity, analytics capabilities, and ease of integration.
EGUIDE:
Narrowband and IoT combined can bring out the best parts of both technologies in smart cities, asset tracking and agricultural projects, but NB-IoT use cases have disadvantages. In this e-guide learn more about these use cases and challenges.
WHITE PAPER:
This article suggests that enterprises need to look externally as much as internally to understand the impact a pandemic might have, and to prepare an appropriate response.
WHITE PAPER:
This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
WHITE PAPER:
IP addresses are being nearly depleted due to the immense popularity of the internet and the need to have a unique IP address to identify each device using it. Running out of internet addresses would have disastrous effects.
TRIAL SOFTWARE:
Having Internet in the workplace – while a necessary feature – can cause two serious challenges: employee inefficiency and security threats. Rather than revoking Internet privileges, discover how you can properly manage and monitor Internet use, preventing these two issues.