You've requested...

Download this next:

Will mobile networks cope with the end of roaming charges?

EU mobile users are celebrating the end of roaming charges, but this leaves networks to deal with the consequences.

While the end of mobile roaming charges carries a significant personal benefit for the general public, mobile network operators (MNOs) and mobile virtual network operators (MVNOs) must face up to the loss of a significant revenue stream.

Download this issue of Computer Weekly to discover how the industry must face up to the challenges of implementing the new rules, around mobile roaming charges.

These are also closely related to: "Smarter communications through analytics"

  • Current trends in mobile networking

    There’s no doubting that the word on everybody’s lips in the mobile industry this year is 5G, the next generation of mobile networks, promising vast improvements in browsing speed and network capacity, and enabling future use cases.

    But two years before anticipated commercial roll-outs, little is really known about 5G, and what its impact will really be. In this e-guide to mobile networking we help shed some light on the technology, exploring current approaches to 5G, checking out the landscape and finding out how government, regulators and the industry itself are helping lay the groundwork for the future of mobile networking, as well as learning how the conversation moved on at Mobile World Congress 2018 at the end of February.

    Of course, 5G is still just one part of the picture. There’s plenty of mileage left in 4G mobile networks, and we will also examine how the current mobile networking standard is still being enhanced and refined.

    Finally, with Brexit less than 12 months away, we will explore the possibility that British travellers to the EU will once again have to pay sky-high mobile roaming charges after March 2019. Business travellers and tourists alike heaved a sigh of relief last year when EU legislation eliminated these charges – could they be about to make a comeback?

  • Top 2023 cloud workload protection platforms

    The adoption of cloud workload protection platforms (CWPPs) is rapidly increasing as more organizations migrate their workloads to the cloud, embrace cloud-native technologies, and accelerate cloud IaaS spending growth.

    In fact, most organizations want to use cloud security to prevent breaches (31%) and detect and respond to cloud threats (30%). And last year, the global CWPP market recorded revenue of over $3 billion, representing a year-over-year growth of 47.9%.

    Explore the key capabilities of CWPP solutions and the top vendors in the market today in this analyst report.

Find more content like what you just read:

  • Enabling tech-smart healthcare from the ground up

    To support their now-largest statewide healthcare organization, Banner Health aimed to centralize employee communication and patient response on a single all-in-one enterprise-class mobile device. In this case study, explore how they found their missing operational puzzle piece in Zebra’s TC52-HC mobile computers.

    Download

  • The future of enterprise IT: Social, mobile, analytics and cloud

    Mobile and data technologies are allowing organisations to provide service levels not even dreamt of a few years ago. This guide looks at some examples of these technologies transforming organisations in Australia.

    Download

  • The future of enterprise IT: Social, mobile, analytics and cloud

    Mobile and data technologies are allowing organisations to provide service levels not even dreamt of a few years ago. This guide looks at some examples of these technologies transforming organisations in Australia.

    Download

  • Understanding RCS and SMS: Pros, cons & what to know

    Today, many organizations are starting to leverage Rich Communication Services (RCS). But what exactly is RCS? How does it differ from SMS? What are the benefits of the two methods and which one may be best for your organization’s needs? Dig into this article to learn more.

    Download

  • Food & beverage ERP software guide: Facing digital transformation

    Facing rising costs and uncertainty, it has become critical for the food industry to prioritize digital transformation. To do so, some have turned to tailored ERP software. Access this guide to learn more.

    Download

  • Esendex API empowers SMS-based marketers to improve conversion rates

    Noc Solutions LLC, which offers integrated mobile messaging solutions to marketers, was challenged to cost-effectively supply fast and scalable SMS to US-based retailers and ecommerce customers. The results? Download this case study to unlock the full results and to learn how your company could benefit from the solution: the Esendex API.

    Download

  • Building a Micro-Segmentation Strategy in 5 Steps

    Download this white paper to learn how to build an effective micro-segmentation strategy including identifying high-value assets, mapping your application dependencies and enrich with vulnerability data, understanding the types of segmentation for security, and more.

    Download

  • MTL Security Checklist for 2019

    Mobile Thought Leaders (MTL) Research gathers insights from professionals focused on advancing or supporting mobile and digital transformation initiatives.

    Download

  • Middle East IT Priorities 2016

    Computer Weekly's annual global survey of readers has once again revealed what CIOs around the world, including an increasing number of Middle East based IT leaders, are planning over the next 12 months.

    Download

  • Infographic: T-Mobile Business solutions for the evolving work environment

    Download this infographic here to discover T-Mobile Business Internet’s use cases—including for temporary sites, hybrid workers, and POS systems—as well as efficacy in contactless payments and construction's 5G deployment plans.

    Download

  • Vendor Study – Software Defined Solutions and Services

    This ISG Provider Lens study examines the different kinds of global network offerings related to SDN. These include SD-WAN (consulting, implementation and managed services), SD-WAN (DIY) and equipment and service supply to enterprises for own operation. Read the study now to learn which could best fit your business’ needs.

    Download

  • Key ways food industry experts are combatting top challenges

    With 77% of UK food companies reporting that they expect year-on-year revenue growth, many organizations are taking on new strategies to combat modern challenges. So, how can this best be done? Dig into this guide to learn more.

    Download

  • Does your mobile security spend miss the target?

    In this IDC infographic, discover why mobile security spend too often misses the target, and why SMBs must readdress their mobile security priorities.

    Download

  • How to Create a Mobile Device Security Policy, With Template

    In this eGuide, you will hear that a mobile security policy is vital to securing an organization's work environment by defining potential risk factors. Take this brief survey about your current mobile security challenges to get access to this guide!

    Download

  • Worldwide Application Modernization Services 2023 Vendor Assessment

    Using more than 200 criteria and two dozen customer interviews, IDC evaluated 12 third-party organizations that provide application modernization services to enterprises with revenue of $1 billion or more, finding that IBM’s capabilities and forward-looking strategy positioned the service provider in the Leaders category.

    Download

  • Mobile security moving to a unified approach

    This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.

    Download

  • Why mobile devices pose inherent security risk

    Mobile endpoints are increasingly the path of least resistance for attackers. 50% of security professionals report that it is “likely to certain” that their enterprise has already had a security incident due to inadequate mobile device security. Download this white paper to learn how you can secure your mobile workforce with Mobile Threat Defence.

    Download

  • What to look for in an SMB-ready mobile device

    Read this TechTarget e-guide to glean mobile device selection methods and best practices for SMBs, including what to look for in a mobile device, picking rugged mobile devices vs. consumer-grade ones, and deployment approaches.

    Download

  • The changing mobile platform landscape

    So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.

    Download

  • How to choose a database for your mobile apps

    Consumers rely on mobile applications, even when there is no internet connection. To help you provide the always-on experience customers demand, database solutions like Couchbase Mobile have added synchronization and offline capabilities to their mobile database offerings. This white paper helps you choose the best mobile database for your needs.

    Download

  • Today’s new supply chains: moving from insight to action in real time

    The journey of the products in your supply chain are often full of surprises, despite your best-laid plans. Access this solution overview to learn how you can monitor every aspect of your value chain down to the item level & develop the agility to overcome obstacles, boosting customer satisfaction & revenue with the Parkour supply

    Download

  • How to take an Agile approach to mobile app development

    This Computer Weekly buyer's guide looks at how to take an Agile approach to mobile app development. Discover how to gain a competitive edge by accelerating mobile development, turning mobile users' expectations to your advantage, and building unique, differentiated mobile experiences.

    Download

  • How to balance mobility and security

    When it comes to mobile security, companies typically apply only one layer of defense and will often forget to set automatic updates, leaving their corporate data vulnerable to attack, increasing the chance of data loss or leakage. . Take a brief survey to tap into this e-guide demonstrating how to properly protect your mobile data.

    Download

  • Managing Android devices in the enterprise

    This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).

    Download

  • Enterprise mobility management software offerings and use cases

    Enterprise mobility management software allows IT to deploy security policies and provide access to internal resources by integrating with APIs in the mobile OSes. This e-guide shows enterprise mobility management software offerings and use cases.

    Download

  • How to build your digital communications governance (DCG) strategy

    The message from the regulators is clear; having an off-channel policy for mobile communications is not good enough. Download this e-book to learn about the top 5 mobile DCG best practices that will cultivate productive, flexible and compliant mobile communications.

    Download

  • How leading contact center-as-a-service solutions stack up

    In this analyst report, discover how the top-ranking CCaaS solutions stack up against the competition, and find out which solution is best for your enterprise.

    Download

  • Fast facts from 2024 SonicWall Cyber Threat Report

    SonicWall Capture Labs recorded 6.06 billion malware attacks in 2023, representing a year-over-year increase of 11%. So, what else should you know about that prevalent threat? Browse this infographic to find out.

    Download

  • 4 Types of Mobile Security Models and How They Work

    In this eGuide, you will hear that an IT admin often has to find the best tools and practices to enhance the security of the enterprise from threats. Take this brief survey about your current mobile security challenges to get access to this guide!

    Download

  • The future of e-commerce and CRM

    Inside, learn about some trends vendors and analysts are predicting for the future of e-commerce and CRM, and explore key considerations when planning your CRM spend.

    Download

  • A guide to developing modern mobile applications

    A key ingredient of eBusiness is the ability to offer customers the very best user experience, irrespective of whether they use a web browser, a mobile browser or a mobile app. In this guide, we explore the challenges organisations face in managing the numerous ways customers can transact with businesses.

    Download

  • Computer Weekly – 9 August 2016: Will Rio's 4G sink or swim?

    The Rio Olympic games are meant to be the fastest Games ever – not just for the athletes, but also for mobile data speeds. Users will want to upload photos and videos in real time. In this week's Computer Weekly, we investigate how operators are working round Brazil's patchy 4G. We also find out how Glasgow's smart city initiatives are evolving.

    Download

  • Focus: Enterprise Mobility Management

    In this e-guide, we will explore exactly enterprise mobility management, looking in-depth at some of the key trends and developments in the world of enterprise mobility, as well as keeping a watchful eye on cybersecurity.

    Download

  • How complacency kills mobile security

    In this expert guide, learn how a lackadaisical attitude towards mobile security can prove to be catastrophic to enterprises as mobile threats continue to exploit known vulnerabilities to gut profits.

    Download

  • E-book: Mobile security strategies

    As organizations capitalize on the flexibility of a mobile-first workplace, they also encounter 4 key risks, including data breaches through lost or hacked devices. To discover the other risks, and to learn about the benefits and drawbacks of 5 mobile security approaches, review this e-book.

    Download

  • How to understand if your SASE solution is truly effective

    Not all SASE platforms are created equal. The best solutions offer the ability to combine SD-WAN and security into a single, integrated solution that delivers both full protection and a seamless user experience, regardless of location. Read on to learn more about the 10 tenets of an effective SASE solution and overcome your network challenges.

    Download

  • Build secure, threat-resistant apps

    In today's digital landscape, mobile applications have emerged as a valuable tool for boosting productivity, but they also bring considerable risks. In this white paper, discover how StarHub Mobile Application Protection Suite (MAPS) empowers enterprises to build secure and robust mobile apps that can withstand attacks.

    Download

  • Top 10 Australian IT stories of 2017

    In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at what the country is doing to improve work productivity, upgrade its supercomputing infrastructure, harness the internet of things to improve business operations and realise its space ambitions.

    Download

  • Jamf Protect: Protect vulnerable mobile devices

    Modern worker flexibility has enabled mobile devices to join the roster of network devices, adding security concerns. Jamf Protect is a purpose-built mobile threat defense solution that defends against mobile attacks, enforces acceptable use or data capping policies, and provides clear visibility into device compliance. Read on to learn more.

    Download

  • The key for modernization? Better unified communications

    Real-world examples show how RingCentral's unified communications platform helped businesses like phoenixNAP, C&S Wholesale Grocers, and Conair save hundreds of thousands in costs, boost efficiency, and improve customer experience. Learn how RingCentral can modernize your business communications.

    Download

  • The economic value of Red Hat Ansible Automation Platform

    In this IDC report, you will learn about the business benefits of using Red Hat’s Ansible automation solution. Highlights from the report include:$8.54 million higher revenue per organization per year36% development team productivity gainsRead the full, 30-page report to explore the ROI you could receive from using Ansible.

    Download

  • CW Benelux May 2018

    GDPR becomes law at the end of this month, so we take a look at how organisations in the Netherlands are preparing for it. Cover your eyes if you are squeamish as you only have days left to get things right.We lead this issue with a story published in February, so perhaps things have changed. But if not, some organisations should be concerned.

    Download

  • Staying on top of your mobile device fleet 24/7

    Mobile devices are now an essential and integral part of the modern workplace enabling employees, contractors, and third-party vendors to access a wide variety of business-critical applications and data. Learn how a 360° mobile device management (MDM) helps you stay on top of your mobile device fleet 24/7.

    Download

  • Unlock the value of data with data innovation acceleration

    This research examines how organizations with mature data innovation practices unlock value from their data. It finds that Data Innovation Accelerators enjoy significant benefits like 19% revenue growth, 14% cost reductions, and 5 new product launches. Read the full white paper to learn how you can accelerate data innovation in your organization.

    Download

  • Computer Weekly – 13 February 2018: On the path to diversity in tech

    In this week's Computer Weekly, after the UK celebrated 100 years of women's suffrage, we look at what more needs to be done to encourage greater diversity in IT to help tackle the ongoing skills shortage. We examine how mobile app developers can improve security. And we look at the role of containers in storage architecture. Read the issue now.

    Download

  • Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing

    Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.

    Download

  • The Healthcare finance leader’s cost-cutting playbook

    Prior to the pandemic, hospitals could insulate against rising costs with strategies to increase revenue, such as adding services or new facilities. However, recent years have seen revenue fall as swiftly as costs rose. Follow this cost-cutting playbook designed for healthcare finance leaders to get your bottom line back in good shape.

    Download