You've requested...

Share this with your colleagues:

Parallel Programming Talk #42 - Wolfgang Von Rüden from CERN

If a new window did not open, click here to view this asset.

Download this next:

Computer Weekly – 26 February 2019: Delving into viewer data at the BBC

In this week’s Computer Weekly, we talk to the BBC about how the UK broadcaster is using data analytics to better understand its viewers and grow its audience in the face of competition from the likes of Netflix. We look at how CERN is using IT automation in its quest to unravel the mysteries of the universe. And we examine the impact of GDPR on cloud storage. Read the issue now.

These are also closely related to: "Parallel Programming Talk #42 - Wolfgang Von Rüden from CERN"

  • 4 goals driving modern enterprise IT

    Enterprise networks have never been more complex, as decentralization, the rise of SaaS, and a greater reliance on connectivity across organizations collide, they create a “rising tide” of challenges that enterprise IT must overcome to best serve end users. In this white paper, explore 4 key areas where IT teams must succeed as their networks evolve.

  • CW Buyer's Guide: IT for SMEs

    In the face of ongoing economic uncertainty businesses are coming under increasing pressure to do more with less. The easy answer is to lengthen refresh cycles and sweat assets, but this six-page buyer’s guide looks at more innovative methods that small to medium-sized enterprises can use to make the most economic and rewarding buying decisions for their business and extract the most value from their IT ivestments.

     

    Contents:

     

    Optimising IT assets

     

    Outsourcing IT services: goals and negotiations

     

    Do business the smart way

     

    Click on the button below to download this guide

Find more content like what you just read:

  • Top 10 Artificial Intelligence stories of 2018

    Some experts believe there are certain problem areas that the AI approaches currently in use cannot easily solve. Problems such as modelling climate change show the limits of AI pattern matching. Instead, something is needed that can combine machine learning with physical modelling. Here are Computer Weekly's top 10 AI stories of 2018.

    Download

  • Remediating IT vulnerabilities: Quick hits for risk prioritization

    There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.

    Download

  • Computer Weekly – 19 November 2013: Software-defined networking explodes

    In this week's Computer Weekly, we look at the fast-growing trend for software-defined networking, and how startups are shaking up the established suppliers. We examine the new guidelines for using bring your own device schemes in the public sector. And we find out how second-user software could save money on licensing. Read the issue now.

    Download

  • E-Guide: Remediating IT vulnerabilities: Expert Tips

    This expert E-Guide uncovers 3 quick ways you can remediate IT vulnerabilities and discusses best practices for improved vulnerability management.

    Download

  • Critical infrastructure security: Key challenges and statistics

    Critical infrastructure attacks can have long-term impacts on vital industries like power, healthcare, defense, food production and more. In this edition of ThreatQuotient’s Industry Brief, take an in-depth look into the challenges and key statistics surrounding critical infrastructure security.

    Download

  • 5 strategies for business analytics success

    Many businesses are fundamentally restructuring themselves and placing analytics at the heart of their strategy; often, this restructuring fails because of poor planning and execution on behalf of the company. Businesses need to see universal buy-in in order to have success with these initiatives. Read on to learn how to get that buy in, and more.

    Download

  • MicroScope: Hatch a plan for retirement

    An issue looking at the issues around business management and retirement and how distribution plays a crucial role with cloud and IoT.

    Download

  • CW Buyer's Guide: Client Computing

    Computer Weekly looks at Windows 8 and the complexities of mobile working, the benefits to the business of an enhanced user experience and the shift from the 9-to-5 office desk to IT delivered over a variety of devices, anytime, anywhere.

    Download

  • VMworld 2017 recap: Adapting legacy IT

    In this week's Computer Weekly, experts at VMworld 2017 discussed how to adapt legacy IT to make the most of modern technology – we listened in. Artificial intelligence is touted as an aid to decision-making, but it needs to be handled with care. And we learn how Wales has become a hotspot for cyber security innovation. Read the issue now.

    Download

  • Enterprise Gamification: Playing to win

    Enterprise gamification is becoming increasingly important to delivering true business transformation, according to this report from Capgemini.

    Download

  • How does cloud computing alleviate data center pressure?

    Only 31% of IT decision-makers surveyed said that they had a repeatable, optimised or managed strategy in place. Take a look at this vendor-neutral buyer's guide to see how the experts are predicting cloud computing will impact your data center in the next 3 years.

    Download

  • Computer Weekly – 9 October 2018: NHS app marks a new era for UK health service

    In this week's Computer Weekly, we examine the long-awaited mobile app from the NHS and ask what it means for a digital health service. We hear from early experimenters of blockchain to find out what it will take for the technology to be enterprise-ready. And we analyse the impact of M&A on corporate networks. Read the issue now.

    Download

  • Computer Weekly – 19 March 2019: How IT leaders should work with marketing

    In this week's Computer Weekly, experts advise on how IT and marketing chiefs can work together to deliver a high-quality customer experience. We examine how supercomputers are transforming science by processing large-scale data analytics. And we look at a key ethical aspect of AI – how to explain the decisions an AI makes. Read the issue now.

    Download

  • Integrating Mobile Device Management with UC Systems and Features

    This E-Guide from SearchUnifiedCommunications.com explores the issues with combining the unique communications services and interfaces of multiple mobile device operating systems with corporate unified communications (UC) strategies, and best practices to overcome these challenges.

    Download

  • Data integration to support modern BI and advanced analytics programmes

    In this e-guide we discuss why data integration and preparation are the unsung heroes of modern BI and advanced analytics. More so than ever, it would seem, due to the ever-increasing volume and variety of data.

    Download

  • WAN Speak Musings – Volume I

    Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.

    Download

  • The Role of Software-Defined Networks in Cloud Computing

    This expert guide breaks down the role of software-defined networks on a cloud computing environment.

    Download

  • Computer Weekly – 10 July 2018: Tackling the digital identity problem

    In this week's Computer Weekly, as UK government attempts to create a digital identity standard flounder, we examine progress on establishing the online ID system the digital economy needs. Barclays bank talks about its move to DevOps and public cloud. And we find out how AI could help improve IT service management. Read the issue now.

    Download

  • The Digital Enterprise

    Not every business is a digital business, but every business must become digital, writes Karl-Heinz Streibich in this book extract.

    Download

  • A Computer Weekly buyer's guide to big data

    Companies are switching on to the advantages of big data. In this 13-pagebuyer's guide, Computer Weekly looks at data analytics, how to get value out it and the benefits of process mining.

    Download

  • E-Guide: How to Identify Which Applications are Right for Public Cloud Computing

    In this e-guide from SearchCloudComputing.com, gain expert insight into how public cloud computing benefits businesses of all sizes. Discover how to identify which applications are good candidates for cloud computing and which are not. And find out about alternatives to adopting a full public or private cloud computing strategy.

    Download

  • The discipline of workplace experience, explained

    Workplace experience – also known as WX – is a new approach to workplace modernization. Dive inside this guide to learn more about new, innovative WX strategies, and find out why this new workplace discipline is earning the attention of business and IT leaders alike.

    Download

  • CW ASEAN: Unlock flash opportunities

    Traditional disks can no longer keep up with the needs of modern enterprises. In this issue of CW ASEAN, we take a look at how enterprises are taking to all-flash array storage, and what they need to do to lay the foundation necessary for getting the most out of the technology. Read the issue now.

    Download

  • Why businesses are hiring AIs to improve CRM, IT ops and more

    In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.

    Download

  • Consolidating mixed database workloads with Dell EMC

    Access this white paper to discover how you can take the risk out of data center consolidation while collapsing multiple storage silos, drive efficiencies, and achieve greater visibility into the performance, availability, and health of your databases.

    Download

  • 8 keys to turbocharging remote worker productivity

    Collaboration tools are just a small sliver of the toolkits that remote workers will need to maintain productivity while working outside of the office. Dive into this eBook to learn 8 ways to turbocharge the efficacy of your remote workers while still keeping their welfare front-and-center.

    Download

  • How to Integrate UC with Mobile Device Management

    This E-Guide from SearchUnifiedCommunications.com offers best practices for managing mobile unified communications (UC) in a bring your own device (BYOD) environment. Read now for tips and hints to integrating mobile device management (MDM) with your UC systems and features.

    Download

  • Desktop virtualization: Streamline deployment without extra costs

    Access this expert e-guide to learn how to assess your IT infrastructure to ensure a fast and cost-effective desktop virtualization process.

    Download

  • CW Buyer's Guide to Business Process Automation

    Computer Weekly looks at how to facilitate and manage the growing role of workload automation in the enterprise in this 10-page buyer's guide.

    Download

  • CW Nordics August 2018

    In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.

    Download

  • A Computer Weekly buyer's guide to CIO leadership

    In this 14-page buyer's guide, Computer Weekly looks at how the age of the customer requires IT leaders to focus on both the business technology and IT agendas; why IT leaders need to use blogging and social media to raise their profile and build influence in their organisations.

    Download

  • How to enhance your network for the future

    The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.

    Download

  • CW Europe – September 2018: Costs stack up for Dutch government IT projects

    In this issue of CW Europe, we look at analysis by a Dutch newspaper which discovered that government-controlled IT projects in the Netherlands go over budget by 40%, on average. We also find out how Berlin's Digital Career Institute is building web skills among refugees and the unemployed across Germany.

    Download

  • Top 10 network stories of 2018

    2018 was the year when software-defined networking, and more specifically software-defined WANs, took centre stage. We look back at a transformative year for the world of the network manager. Here are Computer Weekly's top 10 networking stories of 2018.

    Download

  • Collaboration: Decision Time: Product Benefits and Tradeoffs

    This is the third piece in SearchUnifiedCommunications.com's three-part guide on collaboration products. This expert asset takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing a collaboration solution.

    Download

  • Overcoming the insight deficit

    Learn how you can empower your employees to make the most of big data and data analytics in this executive guide from the Corporate Executive Board.

    Download

  • SAP Managed Services Survey Findings

    During Q2, 2010 The Birchman Group carried out a survey focused on SAP support and managed services.

    Download

  • CW Benelux ezine August 2018

    It's hardly surprising that the Netherlands is pioneering smart cities. The tech-savvy nation is already planning to have a digital port in Rotterdam with automated ships. Now, according to one Dutch academic, "almost every Dutch municipality is doing something with smart technology".

    Download

  • Who should get the technology vote in the UK General Election?

    In this week's Computer Weekly, we take an in-depth look at the technology and digital policies in the main political parties' election manifestos. We examine the rise of alternatives to relational databases that better support a big data environment. And we assess the security issues around container technology. Read the issue now.

    Download

  • Linking Master Data Management to Big Data

    How does Master Data Management (MDM) impact big data, and vice versa? In this e-guide, Gartner Research vice presidents Andrew White and John Radcliffe, and founder and chief research officer with the MDM Institute, Aaron Zornes, share their insights and advice on leveraging MDM tools and strategies to combat big data and other trends.

    Download

  • 7 ways to build a DevSecOps toolchain

    Adapting to the growing landscape of mobile security threats, many DevOps teams are shifting towards a DevSecOps model to keep ahead – a feat that’s not always easy. Uncover the seven essential steps for building a highly effective DevSecOps toolchain that accounts for the needs of all team members along the chain.

    Download

  • Case study: Essex County implements zero-trust to meet GDPR requirements

    The initiation of GDPR caused widespread change in the way organizations handled consumer data across the EU. In this case study, follow the Essex County Council, keepers of personal data for their residents, through their post-GDPR journey towards zero-trust access control to enable their employees to collaborate in a secure environment.

    Download

  • Research report: The future of higher education in Europe

    The world of higher education in Europe is facing fundamental changes. To understand how these institutions are responding to changes in their sector, and provide practical solutions, Dropbox carried out a study on the future of higher education. Download this report to explore the results.

    Download

  • SOAR vs SIEM: Research findings and recommendations

    Although SOAR and SIEM share similar security capabilities, they are distinct markets unlikely to consolidate. However, technology leaders at SOAR providers need to understand this distinction in order to build upon existing SIEM services. This deep dive from Gartner focuses on SOAR and offers recommendations for SOAR providers.

    Download

  • 25-pg. eBook: Data-centric best practices, explained

    Open up this 25-page eBook to learn about the guiding principles behind data-centric protection methodologies, and discover data-centric best practices for encryption, data masking, hashing, tokenization, and more.

    Download

  • Secure Voting

    This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.

    Download

  • Fact or fiction? 6 debunked call recording myths

    Although seen as a necessity by any regulated business or contact center that takes itself seriously, call recording still remains one of the most undervalued and underutilized features. But why is this? Discover the truth behind 6 common call recording myths. Plus, uncover what features to look for in a call recording system.

    Download