You've requested...

Performance, Flexibility, and Savings at Community Colleges

If a new window did not open, click here to view this asset.

Download this next:

Focus: Desktop virtualisation and mobility

As enterprises look to tap into the productivity benefits that come from enabling their employees to use smartphones and tablets to get their day-to-day work done, interest in the use of desktop virtualisation technologies has risen accordingly. Desktop virtualisation, after all, allows organisations to run virtual machines on their PCs, smartphones and tablets to provide their employees with access to a wide range of work applications wherever and whenever they need them. Applications deployed in an environment such as this are often considered to be easier to update, while making the process of managing and storing corporate date on employee devices easier to do. In this guide, we take a close look at how a number of CIO from a wide range of industries have sought to address the demand for mobile working within their organisations, and the technologies they have deployed to ensure data security and access is maintained at all times.

These are also closely related to: "Performance, Flexibility, and Savings at Community Colleges"

  • Redefine data visualization and insights with AI

    To accelerate insights, engage with predictive analytics, enable 3D visualization—these are three of the many AI use cases that businesses in all industries are tapping into.

    Along with delving into those use cases, this white paper explores one way that your organization can harness the power of AI: leveraging a PowerEdge server.

    So, how does such a server work, and what benefits can it afford your business?

    Take a look through the paper to unlock answers.

  • Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?

    In this week’s Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. The Black Lives Matter movement has raised awareness of social inequalities, but is the tech sector succeeding in becoming more diverse? And we ask if business software should learn from the addictive nature of social apps.

Find more content like what you just read:

  • How virtual desktops simply end user computing during lockdown

    While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.

    Download

  • Top 10 datacentre stories of 2021

    The 2021 datacentre news cycle has been dominated by stories about how demand for hyperscale datacentre capacity is continuing to boom, while market watchers grow increasingly concerned about how all this growth is affecting the environment. With this in mind, here's a look back over Computer Weekly's top 10 datacentre stories of 2021.

    Download

  • Deep learning for countering energy theft – a hybrid long-short term memory approach

    Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.

    Download

  • Can AI take education to a new level?

    In this week's Computer Weekly, we examine how LLMs are being used to teach, support and assess students, enhancing education rather than impairing it. We look at how AI is impacting the semiconductor sector as big tech companies put off server upgrades. And we find out how GenAI is changing the way enterprise software works. Read the issue now.

    Download

  • Computer Weekly – 23 July 2019: How Apollo 11 influenced modern computing

    In this week's Computer Weekly, on the 50th anniversary of the Moon landings we look at the influence Apollo 11 had on modern hardware and software. Our latest buyer's guide examines data protection. And we find out how retailers with physical stores are using technology to respond to the rise of online shopping. Read the issue now.

    Download

  • Datacentre design: Building leaner, greener server farms

    The need for energy efficiency, resiliency and security have, for many years, been the driving forces behind the way that operators have approached building their datacentres. In this e-guide, we take a look at how the need for energy efficiency and sustainability is altering the way operators approach their datacentre builds and designs.

    Download

  • Pipeline-native scanning for modern application development

    Tap into this white paper to learn about an approach to application security that uses demand-driven static analysis to automatically triage vulnerabilities according to next-step actions within a modern development environment.

    Download

  • Top 10 ANZ IT stories of 2022

    In this roundup, Computer Weekly recaps the top 10 stories in Australia and New Zealand (ANZ), including the opportunities and challenges that organisations in the region have faced over the past year.

    Download

  • A Computer Weekly buyer's guide to cloud bursting

    Cloud ideas expand. In this 12-page buyer's guide, Computer Weekly looks at the benefits and complexities of cloud bursting and the role of on-premise IT.

    Download

  • Analyst report: 239% ROI from IBM Security Qradar SIEM

    As cyberthreats proliferate, so do security alerts. Because of this, security analysts are pressed to quickly and thoroughly investigate frequent incidents. In this Forrester TEI report, learn how analysts have saved 90% more time when investigating incidents.

    Download

  • Top 10 artificial intelligence stories of 2019

    According to Gartner's 2019 CIO Agenda survey, organisations that have deployed artificial intelligence (AI) grew from 4% to 14% between 2018 and 2019. These are Computer Weekly's top 10 AI articles in 2019.

    Download

  • Lean ITSM Methods in Lean Times

    As IT shops continue to look for ways to cut costs, increase efficiency and improve service, many turn to IT Service Management frameworks for guidance. Learn how to adopt or advance your use of ITSM practices to streamline IT and build an efficient, service-oriented organization.

    Download

  • A Computer Weekly buyer's guide to going beyond desktop Computing

    A digital workplace opens up a range of new possibilities for businesses, but it needs to be implemented in the right way. In this 13-page buyer's guide, Computer Weekly looks at how digital workplaces demand increasing functionality, how to make sense of desktop as a service, and the value of unified endpoint management.

    Download

  • 7 advantages of a SaaS-based application security program

    In this infographic, discover 7 advantages of a SaaS-based application security program vs. on-premises.

    Download

  • CW Europe - December 2022 - February 2023: Finland prepares for drone technology take-off

    Finland is preparing for a future where it could rely on flying drone technology. Read about its plans in this issue. Also find out how a PhD student in the Netherlands is helping to detect hidden messages on the internet by using steganography.

    Download

  • Breaking Free from Leads-Based Models

    To learn why and how to shift away from Marketing Qualified Leads (MQLs) and evolve your business’s revenue engine, read this e-book that features insights from Forrester VP and Principal Analyst Terry Flaherty.

    Download

  • The Evolution of Threat Detection and Management

    This e-guide from SearchSecurity.com explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.

    Download

  • Computer Weekly – 4 July 2023: How data is beating heart disease

    In this week's Computer Weekly, we find out how a new data strategy is helping the British Heart Foundation to raise money and support medical research. We examine the benefits of using AI in advanced malware detection. And we reveal why the Information Commissioner is under fire for weak responses to serious data breaches. Read the issue now.

    Download

  • A Computer Weekly buyer's guide to deep learning

    Deep learning can help companies operate faster and more efficiently. In this 13-page buyer'sguide, Computer Weekly looks at the advanced tools available for developers building intelligentapps, the frameworks that can be used and the kit that can enhance a programmer's toolbox.

    Download

  • 5 principles for securing DevOps

    Integrating security operations into pre-existing DevOps processes can yield numerous business benefits – including a measurable growth in both profit and revenue. Read this whitepaper to unlock the 5 principles of DevSecOps to help you get started.

    Download

  • Red Hat OpenShift AI: Customer success stories

    Artificial intelligence and machine learning (AI/ML) technologies employ data to deliver business insights, automate tasks, and advance system capabilities. This e-book shows how organizations across industries are using Red Hat technologies to build AI/ML solutions that deliver real business value.

    Download

  • 6 essential steps to building a production-ready AI/ML environment

    Download this e-book to learn the 6 essential steps to building a production-ready AI/ML environment.

    Download

  • Media Consumption Study 2017 UKI

    The results of TechTarget and Computer Weekly's annual reader survey, which asks for feedback on readers' media consumption when considering an IT purchase, reveals the complexity of IT purchase decisions.

    Download

  • Pulse Survey: "Organizations Struggle to Measure and Monitor Cyber Risk"

    Data from this Harvard Business Review Pulse Survey, commissioned by Tanium, illuminates how effective cyber-risk oversight is hampered by the mutual shortage of knowledge between executives and cybersecurity leaders. Read the report to learn from top executives and analyze the data for yourself.

    Download

  • How to accelerate the adoption of IoT within your organization

    In white paper, join Ensono analysts as they try to surface some of the most important elements to consider when rolling out IoT and how you can accelerate the adoption of IoT within your organization.

    Download

  • 5 FAQs about network platforms: An analyst’s answers

    For a comprehensive introduction to network platforms, download this IDC report and review an analyst’s answers to 5 FAQs about the platforms.

    Download

  • Computer Weekly – 27 April 2021: Justice at last in Post Office IT scandal

    In this week's Computer Weekly, 12 years after we broke the story, victims of the Post Office IT scandal finally have their criminal convictions overturned. We take a virtual tour of a Microsoft datacentre and meet a server called 'Mega-Godzilla Beast'. And we find out how technology is transforming Nationwide Building Society. Read the issue now.

    Download

  • Computer Weekly - 24 August 2021: How datacentre power growth is leaving Dublin in distress

    In this week's Computer Weekly, we look at the challenges faced by Dublin's datacentre sector, as growth leaves the city's electricity infrastructure creaking. We ask whether recent initiatives to close the UK's digital skills gaps are working. And we examine the latest injustice to hit the Post Office Horizon scandal. Read the issue now.

    Download

  • WLAN Access Control and Wi-Fi Network Needs

    This white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.

    Download

  • WLAN Best Practices: 10 Questions to Ask When Evaluating Solutions

    Read this e-guide from our experts at SearchNetworking.com to gain a better understanding of WLAN solutions and how to evaluate them. Inside you'll find critical questions you should ask when exploring solutions as well as a discussion about the myths surrounding cloud-managed WLANs.

    Download

  • CW EMEA: Investing in the future

    There is a lot of uncertainty in the world right now, and businesses might be forgiven for taking a cautious approach to their planning. But one thing is certain, and that is that oil-rich countries in the Middle East will continue to invest heavily in diversifying their economies.

    Download

  • Computer Weekly – 11 February 2020: How the Post Office caused so much misery

    In this week's Computer Weekly, after a landmark legal victory against the Post Office over a faulty IT system, campaigner Alan Bates shares his 20-year story of trials and triumph. Oracle is under fire over its cloud sales practices – we examine the claims. And we look at the sustainability challenges for datacentres.

    Download

  • AWS Quickly and Easily Scale and Secure Your Serverless Applications

    According to Forrester, 25% of developers will be using serverless technologies by next year. However, many organizations have concerns about how legacy application security approaches can support serverless applications. Discover the new serverless security trends that have been cropping up in response to these concerns in this report.

    Download

  • Deploy ML across the hybrid cloud without being limited by architecture

    Discover in this product overview how Red Hat OpenShift AI can help your team develop, train, test, and deploy ML across the hybrid cloud without being dragged down by limited architectural choices.

    Download

  • CW ASEAN: Trend Watch – Security

    Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.

    Download

  • Computer Weekly - 17 March 2020: How NHS Digital is helping support the coronavirus crisis

    In this week's Computer Weekly, we talk to NHS Digital about how technology is supporting the health service's response to the coronavirus crisis. We examine the challenges of running a successful security operations centre. And we look at the emerging datacentre architecture based on composable infrastructure. Read the issue now.

    Download

  • How to unlock business value with AI & cloud analytics

    In this e-book, you’ll discover how the partnership between SAS and Microsoft can help organisations unlock the potential of the cloud to deliver cost savings and innovation, including 5 real world use cases across a variety of industries. Read on to learn how your organisation can accelerate your cloud analytics and AI journey.

    Download

  • Exhaustive Kubernetes e-book: 29 patterns for cloud app development

    This exhaustive O'Reilly e-book aims to help developers discover and learn about the most common patterns for creating cloud-native applications with Kubernetes. Read the book now, or save it for reference material in a pinch.

    Download

  • Securing Data, Not Endpoints: The Best Way to Control Consumerization

    Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.

    Download

  • Computer Weekly – 25 February 2020: Using meteorological data to prepare for the worst

    In this week's Computer Weekly, after the storms that swept across the UK, we look at the technology behind Weather Source's meteorological data service. Oracle and SAP are battling over customers to upgrade their ERP systems to the cloud. And we report from the world's biggest retail tech show.

    Download

  • Aligning risk & service models for operational resilience

    Integrating an entity hierarchy into risk management aligns with CMDB and CSDM for risk visibility. Maturing from tactical to service-centric, it includes third parties, enhancing accountability and transparency. Read to build a robust framework aligned with business services and infrastructure.

    Download

  • Independent analysis of Bitdefender GravityZone

    Hackers are constantly advancing their tools and strategies to perform attacks more effectively. But when compared to those of hackers, how do your tools compare? This white paper presents the results of an independent test conducted by AV-Comparatives to provide an objective analysis of Bitdefender GravityZone. Read on to learn more.

    Download

  • Unlocking the Opportunity of SIEM Technology

    Explore how a security information and event management (SIEM) system works, what types of data you can integrate into it, the process for detecting threats/incidents, and steps you should take to develop a successful SIEM capabilities.

    Download

  • Computer Weekly – 23 January 2024: Davos 2024 – AI disinformation tops global risks

    In this week's Computer Weekly, AI-generated disinformation and misinformation will be the top risks for businesses, governments and the public over the next two years, according to the WEF. Intel's CTO discusses the chip maker's plans for the European market. And we examine the dearth of digital skills among elected officials. Read the issue now.

    Download

  • Getting a handle on AIOps and self-healing systems

    Reducing effort, reacting faster, preventing problems and improving understanding of the IT environment are the key benefits of AIOps, identified by analyst Forrester. To achieve these goals AIOPs platforms are increasingly making use of predictive analytics and automation to offer IT operations a level of self-healing.

    Download

  • Enterprise Strategy Group: How to secure your development practices

    This report from primary research and analyst firm Enterprise Strategy Group (ESG) outlines the significant consequences of failing to modernize your application security strategy and provides an actionable roadmap that developers can follow to secure their development practices from the outset.

    Download

  • Next-generation DAST: Introducing interactive application security testing (IAST)

    While dynamic application security testing (DAST) has been a go-to AppSec testing technique for decades, it is not without its drawbacks. This is where interactive application security testing (IAST) comes into play, building off of DAST, but analyzing apps from the inside out, rather than from the outside in. Read this white paper to learn more.

    Download