You've requested...

Download this next:

CW Benelux - May-July 2022: Meta shelves hyperscale datacentre plan in Netherlands

Meta’s plan for a hyperscale datacentre in the Netherlands which was to serve the metaverse world has been halted following a campaign by environmentalists and the Dutch parliament’s call for the government to do everything in its power to stop the facility being built. Read about it in this issue of CW Benelux. Also read how the Dutch arm of customer services supplier Teleperformance has led the entire organisation to adopt robotic process automation software.

These are also closely related to: "Long-term Archiving"

  • IAM platform: 7 key features & capabilities

    As organizations continuously face fraud challenges while pursuing digital transformations, it’s becoming clear that your IAM strategy must implement better authentication technologies and prioritize cloud-based solutions.

    How do you prevent negative user experiences with MFA adoption? How can you effectively deliver value with behavioral biometric in a SaaS-based format?

    Read on to learn about how BehavioSec’s platform is designed to provide 7 key benefits and alleviate standard IAM challenges.

  • Focus: PCIe SSD, NVMe and flash

    PCIe SSD cards fit straight into PCIe slots in servers and array hardware and often brings much higher performance than traditional HDD-format flash drives. A key use case is to provide fast access storage in the server, with the shortest possible route and therefore low latency for important data. That’s still a key workload for PCIe flash, especially with NVMe now offering huge performance gains over existing SAS and SATA drive protocols, with some vendors now also building arrays with PCIe format drives that use NVMe.

Find more content like what you just read:

  • BluVector ATD Gen3 Systems

    Tap into this technical data sheet to learn about BluVector Advanced Threat Detection (ATD) and how it comes in several formats to meet the demands, needs or requirements of your organization.

    Download

  • Middle East IT Priorities 2017

    This year's Computer Weekly and TechTarget IT Priorities survey has revealed that over half of IT decision makers at Middle East based organisations are planning on reducing how much they send of IT staff, despite the growing importance of IT to business.

    Download

  • Enhance Your Web Application Firewall with API Security

    While organizations use software that relies on APIs, you need to have the same authentication mechanism for each one. This has become necessary as Denial-of-Service attacks (DoS) have increased over time. Read on to learn how you can secure your critical applications.

    Download

  • How to leverage Cribl LogStream to optimize your Splunk Cloud

    Hear from SecOps Engineer Ryan Saunders as he walks through how his security team maximized their Splunk Cloud investment with Cribl LogStream to cut costs and increase efficiency.

    Download

  • Deliver better data pipelines with less effort

    The Financial Industry Regulatory Agency (FINRA) used Cribl LogStream to get massive volumes of data—4TB a day for their analytics platform alone—flowing to the right destinations in the right formats. Read on to learn how LogStream reduces complexity, saves FINRA time and effort with EN mappings, improves data processing, and more.

    Download

  • What is HyFlex teaching?

    Some of the most popular course models that schools are offering include continued distance learning or fully online classes, and a new “HyFlex” format. But, what is HyFlex teaching? Read this blog to fully understand all the benefits of HyFlex teaching.

    Download

  • Improve your contact center performance management

    Calculating and improving the performance management of contact center agents is based on many factors and can spread out across many activities. Download now to explore how you can translate KPIs from complex and disparate into an understandable, actionable format: filtered, organized, analyzed, visualized.

    Download

  • BluVector Advanced Threat Detection

    BluVector Advanced Threat Detection (ATD) comes in several formats to help meet the demands, needs or requirements of any customer. Open this data sheet to learn more about BluVector ATD.

    Download

  • Why the pen test needs an update

    SANS looked at Horizon3.ai's NodeZero, a continuous, autonomous penetration testing platform offered in a SaaS format. This new technology may help provide automated attack modeling and more consistent, repeatable pen tests that mimic real-world attack techniques. Read the report to unlock all the details.

    Download

  • 48-page eBook: Observability pipelines 101

    This 48-page eBook introduces you to concept of observability pipelines – showcasing how it can help slash costs, improve performance, and get the right data, to the right destinations, in the right formats, at the right time. Download now to get started.

    Download

  • Intelligent data integration for the modern data ecosystem

    Read this brief overview of Hitachi’s Content Intelligence engine to learn how it offers highly available, extensible, and secure data discovery and integration that scales with your data and need.

    Download

  • How to develop a data-driven content strategy

    In the second episode of the Content Intelligence Series, Nick Markwith will explore how to start developing a data-driven content strategy that produces results from an analytical perspective.

    Download

  • Startup Odele relies on Domo for data-driven success

    When agile startup Odele turned to Domo for their BI needs, they quickly gained access to critical data in easily understood and manipulated formats. Tune into this short video to learn why Odele credits Domo for much of their success—and why they’re continuing to count on Domo for future data-driven growth.

    Download

  • CW@50: What was happening in IT in August over the years

    The National Museum of Computing has again been looking into Computer Weekly's 50 years of magazine issues for another selection of articles highlighting significant articles published in the month of August over the past five decades.

    Download

  • 7 key considerations when migrating to the cloud

    Migrating workloads to the cloud can be complex and time-consuming. VMware Cloud on AWS can dramatically simplify workload migration through a broad range of automation capabilities. Use this quick reference guide to learn key considerations you should keep in mind prior to, during, and after a cloud migration.

    Download

  • What really matters when searching for threat intelligence services

    As complexity rises and the availability and sophistication of cyberthreats grows, cyberthreat intelligence allows for a more proactive approach. Read this white paper to find out what really matters when you’re searching for threat intelligence services.

    Download

  • How to standardize your ML experimentation process

    The reproducibility crisis in machine learning is a serious barrier to future progress for any organization. Read this e-book to learn the 7 steps in standardizing experimentation, identify the benefits and steps in achieving reproducibility and understand why the CACE principle matters.

    Download

  • SDS vs. traditional storage: What's right for you?

    Learn some tips and tricks to gaining the most value from your SDS program to keep availability high and total cost of ownership low in this expert-eguide.

    Download

  • How SoftIron can help reduce your carbon footprint

    Green computing has become essential for modern enterprise; that's why, as part of SoftIron's commitment to reaching net zero carbon emissions, they have conducted net zero assessments of all assets under SoftIron management. Learn how SoftIron is reducing both their own and their customers' carbon footprint in this white paper.

    Download

  • Build services faster: meet customer demand

    Time-to-market is emerging as a top priority over cost, as well as continuous iteration of products representing ideal customer experiences. For the three key initiatives of time-to-market prioritization, check out this white paper so you can achieve the high-velocity application lifecycle management needed for the future of your digital services.

    Download

  • SDS implementation: What's the best option for you?

    In this expert e-guide, explore today's SDS implementation options and help you decide which one fits your needs best: commodity or custom hardware. Additionally, uncover the important considerations – like the specific needs of virtual environments, access points, and APIs – that you'll need to address when formulating your storage strategy.

    Download

  • How Acronis increases retail server deployment speed by 30x

    Brown Thomas, one of Ireland’s premier lifestyle and fashion stores, feared that store's increasingly time-intensive server backups would become impossible to complete without impeding on operating hours. Dive into this case study to find out how Acronis helped solve Brown Thomas' backup crisis.

    Download

  • Build a data fabric to enable frictionless data access

    Access this R20 Consultancy technical white paper to explore the ways data fabric architectures can be built, utilized, and improved in a way that enables lightning-fast data access while minimizing latency.

    Download

  • Getting to know the ISO 27001 standard

    ISO 27001 is an information security standard designed and regulated by the International Organization for Standardization, and while it isn’t legally mandated, it is the price of admission for B2B business across security-conscious industries. Download this e-book to get started on your ISO 27001 certification journey.

    Download

  • Rethink data integration for the age of big data

    This expert e-guide explores the need for new thinking around data integration in a big data world, and highlights key tools that can deliver the value you're looking for.

    Download

  • Optimize your investigation process with LEMA

    With the amount of video evidence today, law enforcement officers are experiencing an increased strain on labor and costs when it comes to the storage, classification and security. Read on to learn how Law Enforcement Media Analytics (LEMA) can help you process video and image evidence to identify, extract and manage data more efficiently.

    Download

  • Guide: The Minimum Elements for a Software Bill of Materials (SBOM)

    In July 2021, the NTIA published an important document, The Minimum Elements for a Software Bill of Materials (SBOM), to enable the basic use cases for SBOM usage and begin the conversation on future required SBOM elements and features. Access this guide to learn how you can go beyond the minimal requirements for SBOMs.

    Download

  • 8 challenges of Wi-Fi delivery

    Wi-Fi 6 is the latest evolution of Wi-Fi that increases network performance on multiple axes. But there’s still a need for greater capability that goes beyond this standard – mobility and security, for example, are not yet where they could be. Read this white paper to explore 8 challenges of Wi-Fi and how to work around them.

    Download

  • How to unlock the true value of data

    With a robust data architecture in place, a firm's data science team can turn raw data into business insight. We take a quick look at how this can be done.

    Download

  • How to unlock the true value of data

    With a robust data architecture in place, a firm's data science team can turn raw data into business insight. We take a quick look at how this can be done.

    Download

  • Best way to use HDR video without bogging down your workflow

    HDR video is all the buzz, but your creative staff will have trouble handling it with the usual systems. Access this white paper to learn how Dell Precision workstations with high-end video cards and 8k monitors can solve that. Take our short survey on your PC hardware purchase plans to get free access now.

    Download

  • Building the Data Lakehouse

    The lakehouse’s unique ability to combine the data science focus of the data lake with the analytics power of the data warehouse will unlock incredible value for organizations. Get your copy of this e-book to discover the 5 key steps to building a successful data lakehouse.

    Download

  • Ensuring governmental security compliance with Ubuntu

    Watch this webinar for Canonical’s in-depth overview of how Ubuntu can help provide a secure platform to build, operate and innovate with open-source applications and technologies while complying with government regulation.

    Download

  • How to accelerate your Kubernetes adoption

    If you wanted to accelerate your Kubernetes adoption and start scaling your K8s operation, this webinar breaks it all down. By utilizing VMware Tanzu standard and VMware Cloud Foundation, you can scale your Kubernetes while seeing benefits like standardized BOM with automated LCM and full automation. Tune in here.

    Download

  • Storage Performance Benchmarking - A Tool For Normalizing Vendor Claims

    Read on to discover what metrics and standards you need to be looking for to evaluate your next storage investment—whether block, file, or object storage—and learn how Pavilion built a tool that allows you to calculate storage solution comparisons with comparative ease.

    Download

  • Computer Weekly – 22 January 2019: Moving beyond network boundaries

    In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.

    Download

  • Unlock the Potential Inside Your Data Lake

    Some of the world’s top companies are making their data lakes more available for data science and analytics by adopting a Databricks lakehouse on AWS. Find out how, with Delta Lake, you can establish one source of data for all audiences and use cases in your organization.

    Download

  • Understand data modeling to achieve industry 4.0

    Data modeling can help companies standardize information, enable interoperability, show intent, and more. But setting out to achieve data standardization at scale can be overwhelming. Explore this blog post to learn more about what data modeling looks like and discover how HighByte can help your teams develop successful models.

    Download

  • Key strategies in maintaining FedRAMP compliance

    Federal agencies continue to aggressively procure and implement public cloud deployment models and require FedRAMP accreditation for CSPs – but it’s easier said than done. Tap into this white paper to learn key strategies in managing services and maintaining FedRAMP compliance.

    Download

  • Video conferencing standards and interoperability considerations

    Before you can successfully implement a video conferencing system into your enterprise, you must first understand the standards involved to ensure your solution will work with others on your network.  This e-guide uncovers standards and interoperability considerations while also providing migration planning tips.

    Download

  • You've done SOC 2, what's next?

    In this e-book, walk through how to use your SOC 2 efforts as a steppingstone to achieve other IT security certifications and standards including ISO, NIST, & more. Read on to ensure you are ready to scale up and mature your IT security compliance function.

    Download

  • With Advantech’s Design and Manufacturing Services, less is more

    Read through this white paper to learn how Advantech’s Design and Manufacturing Services can help your organization leverage the flood of data in the age of digitalization.

    Download

  • PCI Council issues mobile application rules for software developers

    The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.

    Download

  • How standards-based connectivity creates widespread data access

    Your data access strategy needs adequately respond to the growing complexity of diverse and dispersed data architectures. This webinar show how standards-based connectivity through SQL helps overcome the challenges of distributed data management, impacting everything from data pipelines to app dev. Tune in today.

    Download

  • Support power-efficient computing with SoftIron HyperDrive

    HPC faces many challenges in the decade to come, from reducing the net carbon emissions to managing the diverse requirements for successful edge deployments. For those seeking a more efficient HPC solution, dive into this data sheet to learn how HyperDrive can provide the right combination of usability, scalability, performance, and sustainability.

    Download

  • 5 steps of a standard penetration test

    In today’s evolving threat landscape, the use of standard security testing methods cannot prevent today’s emerging risks. Access this white paper to learn how penetration testing is designed to evaluate your cybersecurity programs effectivenessIn 5 steps.

    Download

  • Top Monitoring Tools to Help Meet Regulatory Compliance Standards

    In this e-guide, gain expert insight on how to remain vigilant in meeting regulatory compliance standards, and uncover top compliance monitoring tools for financial institutions to meet their industry-specific regulations.

    Download