You've requested...

Global Flexibility with Local Performance in Architecture

If a new window did not open, click here to view this asset.

Download this next:

Top 10 datacentre stories of 2021

The 2021 datacentre news cycle has been dominated by stories about how demand for hyperscale datacentre capacity is continuing to boom, while market watchers grow increasingly concerned about how all this growth is affecting the environment. With this in mind, here's a look back over Computer Weekly's top 10 datacentre stories of 2021.

- Cloud and datacentre giants unite to create climate neutral EU datacentre industry by 2030
- Government gets updated powers to intervene on tech-related M&A deals on national security grounds
- OVHcloud confirms no casualties following fire at Strasbourg datacentre campus
- Average size of hyperscale datacentres is on the rise
- Climate change and datacentres: Weighing up water use
- The Cambridge-1 switch-on: UK’s most powerful supercomputer goes live
- QTS acquired in $10bn datacentre deal
- Government flags opportunity for re-use of waste datacentre heat in net-zero strategy
- Dublin in distress: Power supply issues threaten growth of Europe’s second-biggest datacentre hub
- The second coming: The Nordic datacentre market comes of age

These are also closely related to: "Global Flexibility with Local Performance in Architecture"

  • Breaking Free from Leads-Based Models

    Why should B2B marketing teams shift away from Marketing Qualified Leads (MQLs)? Forrester and TechTarget can name seven reasons.

    #1: MQLs can ignore signals that are valuable to sellers.

    Along with mapping out the rest of the reasons, this e-book – Get Off the MQL Hamster Wheel. Get On With Winning Deals. – considers how organizations can evolve their revenue engine.

    Read on to unlock these insights, which are informed by Forrester VP and Principal Analyst Terry Flaherty’s keynote webinar at TechTarget’s Reach event.

  • Top 10 artificial intelligence stories of 2019

    According to Gartner’s 2019 CIO Agenda survey, organisations that have deployed artificial intelligence (AI) grew from 4% to 14% between 2018 and 2019. Organisations are looking to take advantage of smart speakers such as Alexa and Google Home to provide another channel to market, and are rolling out chatbots as an alternative to call centre staff, to deal with common queries. These are Computer Weekly’s top 10 AI articles in 2019.

Find more content like what you just read:

  • Enterprise Strategy Group (ESG): The state of zero trust

    89% of cybersecurity professionals expect their organizations’ zero-trust support spending to increase over the next 12-18 months. In this infographic, TechTarget’s Enterprise Strategy Group (ESG) compiles key findings from a recent study to paint a picture of the current zero-trust landscape. Download now to learn more.

    Download

  • Exhaustive Kubernetes e-book: 29 patterns for cloud app development

    This exhaustive O'Reilly e-book aims to help developers discover and learn about the most common patterns for creating cloud-native applications with Kubernetes. Read the book now, or save it for reference material in a pinch.

    Download

  • Datacentre design: Building leaner, greener server farms

    The need for energy efficiency, resiliency and security have, for many years, been the driving forces behind the way that operators have approached building their datacentres. In this e-guide, we take a look at how the need for energy efficiency and sustainability is altering the way operators approach their datacentre builds and designs.

    Download

  • CW APAC – Trend Watch: AI infrastructure

    Firms are starting to trust artificial intelligence in some of their most important processes. In this handbook, focused on AI infrastructure trends in the Asia-Pacific region, Computer Weekly looks at how it should be deployed, data and sustainability challenges and the advantages of large language models.

    Download

  • Focus: Desktop virtualisation and mobility

    In this guide, we take a close look at how a number of CIO from a wide range of industries have sought to address the demand for mobile working within their organisations, and the technologies they have deployed to ensure data security and access is maintained at all times.

    Download

  • Deep learning vs. machine learning in cybersecurity

    This eBook compares the differences between deep learning and machine learning tools for cybersecurity, helping you determine which makes the most sense for your business. Read the eBook here.

    Download

  • 7 advantages of a SaaS-based application security program

    In this infographic, discover 7 advantages of a SaaS-based application security program vs. on-premises.

    Download

  • The next wave of IoT in Asia: What to expect in 2018

    In this e-guide, read about the APAC businesses that have successfully implemented IoT initiatives and are already reaping the benefits, such as achieving increased ROI and reducing operational disruptions.

    Download

  • Deep learning for countering energy theft – a hybrid long-short term memory approach

    Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.

    Download

  • AI reference designs to enable high-density cluster adoption

    This reference design from Schneider Electric and NVIDIA provides a blueprint for deploying high-density AI clusters in data centers, addressing power, cooling, and density challenges. Get the detailed documentation to accelerate your AI infrastructure planning.

    Download

  • Reference designs for reliable, validated AI deployment

    This reference design from Schneider Electric and NVIDIA provides a blueprint for deploying high-density AI clusters in data centers, addressing power, cooling, and density challenges. Read on now to get the detailed documentation to accelerate your AI infrastructure planning.

    Download

  • Computer Weekly - 8 February 2022: Exploring the metaverse

    In this week's Computer Weekly, the metaverse is set to become a highly competitive commercial playground –profitable markets but also high-profile failures will follow. IT contractors have been hit by cyber attacks on the firms that pay their wages – we examine the impact. And we ask if it's time to plan for quantum computing. Read the issue now.

    Download

  • Navigating the Compliance Labyrinth with AI in Finance

    This e-book examines how AI can help financial institutions meet compliance mandates, fight fraud, and improve customer relationships. For example, AI can automate KYC processes, detect money laundering, and provide a holistic view of customers. Read the e-book to discover how AI can address your financial institution's key challenges.

    Download

  • Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?

    In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.

    Download

  • The benefits of runtime application self-protection

    Traditional application security solutions lack visibility into runtime vulnerabilities, leading to ineffective threat detection and high false positives. Contrast Protect runtime application self-protection (RASP) provides accurate, embedded protection that reduces operational burden on security teams. Read the solution brief to learn more.

    Download

  • Name Matching Software Tackles AML/KYC Challenges

    As financial institutions face increased AML/KYC challenges, Babel Street's AI-powered name matching software can help by reducing false positives, accelerating identity verification, and streamlining compliance workflows. Learn more about Babel Street Analytics Name Match in this eBook.

    Download

  • 5 principles for securing DevOps

    Integrating security operations into pre-existing DevOps processes can yield numerous business benefits – including a measurable growth in both profit and revenue. Read this whitepaper to unlock the 5 principles of DevSecOps to help you get started.

    Download

  • Media Consumption Study 2017 UKI

    The results of TechTarget and Computer Weekly's annual reader survey, which asks for feedback on readers' media consumption when considering an IT purchase, reveals the complexity of IT purchase decisions.

    Download

  • A better toolkit for finding & converting more real leads

    Though foundational to B2B marketing, lead generation can pose a couple significant obstacles. Along with unpacking those challenges, this 21-page e-book by TechTarget maps out 3 tips for driving stronger leads from your business’s lead generation strategy. To access those insights and more, dig into the book.

    Download

  • The essential guide to automated threat analysis

    Phishing and malware threats have become a huge concern for businesses both big and small. Download your complimentary copy of The Essential Guide to Automated Threat Analysis to learn more about how to identify and assess security threats without the need for extensive human intervention.

    Download

  • IT leader's guide for transforming operations with tool sprawl

    The following case study highlights how Schneider Electric unified IT stack observability by working with LogicMonitor. Access the case study to view the full results, and learn how your business could similarly benefit from partnering with LogicMonitor.

    Download

  • Explore AI's transformative impact on the retail industry

    This white paper explores AI's transformative impact on retail, highlighting five key use cases - from personalized shopping advisors to intelligent supply chains. It also offers recommendations for leveraging Supermicro and NVIDIA solutions to unlock AI's potential. Read the full white paper to see how AI is redefining retail's future.

    Download

  • How AI is changing the way data centers are designed

    Artificial intelligence (AI) deployments are taking up an increasingly large portion of data center workloads. This paper explains relevant attributes and trends of AI workloads and describes the resulting data center challenges, including Guidance for how to address these challenges. Read on to learn more.

    Download

  • Data center design best practices amid the AI disruption

    The rapid growth of AI is transforming data centers. This white paper explains key AI attributes and trends that challenge power, cooling, racks, and software management. Guidance is provided to address these challenges and prepare data centers for high-density AI workloads. Read the full white paper to learn more.

    Download

  • The Hidden Costs of Aging Endpoint Solutions: Ransomware, Fileless Malware, and Management Issues

    Existing security teams are overwhelmed due to the proliferation of threat alerts and associated false positives. Solutions like EDR and especially XDR deliver security incident detection and automated response capabilities for your security infrastructure. Read on in this white paper now to learn more.

    Download

  • Computer Weekly - 17 March 2020: How NHS Digital is helping support the coronavirus crisis

    In this week's Computer Weekly, we talk to NHS Digital about how technology is supporting the health service's response to the coronavirus crisis. We examine the challenges of running a successful security operations centre. And we look at the emerging datacentre architecture based on composable infrastructure. Read the issue now.

    Download

  • The Big Book of Machine Learning Use Cases – 2nd Edition

    This E-book contains a collection of technical blogs, including code samples and notebooks, designed to equip you with practical machine learning use cases you can put to work right now. Read on to gain insights from industry thought leaders and learn how you can leverage machine learning to bring your business into the future.

    Download

  • Computer Weekly – 27 April 2021: Justice at last in Post Office IT scandal

    In this week's Computer Weekly, 12 years after we broke the story, victims of the Post Office IT scandal finally have their criminal convictions overturned. We take a virtual tour of a Microsoft datacentre and meet a server called 'Mega-Godzilla Beast'. And we find out how technology is transforming Nationwide Building Society. Read the issue now.

    Download

  • A Computer Weekly buyer's guide to deep learning

    Deep learning can help companies operate faster and more efficiently. In this 13-page buyer'sguide, Computer Weekly looks at the advanced tools available for developers building intelligentapps, the frameworks that can be used and the kit that can enhance a programmer's toolbox.

    Download

  • How to Evaluate Threat Intelligence Feeds

    Know When Software Is Malware. With this guide, you will learn how to evaluate open source and commercial threat intelligence feeds to ensure you have relevant and useful information about malware, ransomware, Indicators of Compromise (IoC) and threat actors, so that your team can identify malicious events and reduce noisy, time-consuming alerts.

    Download

  • Improving Splunk performance and lowering CPU usage with Cribl Stream

    Splunk was first designed for search-time analytics – so if you need to report on massive amounts of data, performance can suffer. Enter Stream: a data pipeline solution that transforms unstructured data to be more structured before it persists to disk. Read on to learn how you can leverage Stream to improve Splunk performance and lower CPU usage.

    Download

  • How Generative AI Can Transform the Public Sector

    Generative AI can transform the public sector by streamlining citizen services, boosting mission outcomes, and improving efficiency. This resource explores how public agencies can leverage foundation models and accelerated infrastructure to deploy generative AI. Read the full report to learn more.

    Download

  • CW Europe - June-August 2022: Russia escalates cyber war on Ukraine

    Microsoft has given details of cyber attacks on Ukrainian civilian communications, nuclear safety authorities, and the exploitation of the destruction of Mariupol in a phishing campaign.

    Download

  • Harness WAF & RASP for complete security protection

    Explore how combining Web Application Firewall (WAF) and Runtime Application Self-Protection (RASP) can provide comprehensive security against known and unknown vulnerabilities. Learn how RASP's runtime monitoring offers deeper protection than WAFs alone. Read the full e-book to learn more.

    Download

  • Discover the 4 keys to successful AI projects

    Discover the four key things you need to know before starting an AI project. Learn how to de-risk your AI initiatives, upskill your team, and leverage a proven hybrid platform to achieve higher ROI. Read this e-book to unlock the full potential of AI for your enterprise.

    Download

  • People continue to be wary of AI chatbots in healthcare and false information

    Although more than half of patients don't trust AI chatbots in healthcare, just under a fifth use the tools regularly.

    Download

  • Wipro Enterprise GenAI Studio (WeGA) powered by NVIDIA

    Is your organization’s approach to AI limiting its potential? Download this product overview to learn how Wipro Enterprise GenAI Studio (WeGA) powered by NVIDIA can help your organization deliver AI solutions while navigating the key challenges.

    Download

  • Explore AI's transformative potential in the telco industry

    AI is transforming the telecom industry and unlocking new growth opportunities. Read this product overview now to discover how Supermicro and NVIDIA can deliver AI-powered solutions for predictive analytics, network optimization, and new services.

    Download

  • How AI is transforming the telecommunications industry

    This white paper explores how AI is transforming the telecommunications industry. Inside, you'll discover key use cases for operational efficiency and new revenue streams, including AI-powered contact centers, network optimization, and sovereign AI factories. Read on now to learn how your organization harness the power of AI.

    Download

  • How to unlock growth opportunities with AI in retail

    In this product overview, you'll discover how AI is transforming the retail industry, with use cases ranging from personalized shopping assistants to intelligent supply chain management. Supermicro and NVIDIA offer scalable AI solutions to help retailers unlock growth opportunities. Read the full product overview to learn more.

    Download

  • Independent analysis of Bitdefender GravityZone

    Hackers are constantly advancing their tools and strategies to perform attacks more effectively. But when compared to those of hackers, how do your tools compare? This white paper presents the results of an independent test conducted by AV-Comparatives to provide an objective analysis of Bitdefender GravityZone. Read on to learn more.

    Download

  • Deploy ML across the hybrid cloud without being limited by architecture

    Discover in this product overview how Red Hat OpenShift AI can help your team develop, train, test, and deploy ML across the hybrid cloud without being dragged down by limited architectural choices.

    Download

  • Fast-track AI innovation with solutions from AWS and NVIDIA

    This eBook explores how leveraging the latest advancements from AWS and NVIDIA helps build performant, optimized solutions while controlling costs.

    Download

  • Computer Weekly - 24 August 2021: How datacentre power growth is leaving Dublin in distress

    In this week's Computer Weekly, we look at the challenges faced by Dublin's datacentre sector, as growth leaves the city's electricity infrastructure creaking. We ask whether recent initiatives to close the UK's digital skills gaps are working. And we examine the latest injustice to hit the Post Office Horizon scandal. Read the issue now.

    Download

  • Analysis of the CVE-2021-2035 vulnerability in RDBMS scheduler

    This white paper analyzes CVE-2021-2035 in Oracle Database's Scheduler. It discusses the attack surface, needed privileges, and defense strategies like limiting scheduler access, setting up SQLNet, and encrypting credentials. Discover how to protect your Oracle Database by reading the complete paper.

    Download

  • Next-generation DAST: Introducing interactive application security testing (IAST)

    While dynamic application security testing (DAST) has been a go-to AppSec testing technique for decades, it is not without its drawbacks. This is where interactive application security testing (IAST) comes into play, building off of DAST, but analyzing apps from the inside out, rather than from the outside in. Read this white paper to learn more.

    Download

  • The state of AI in cybersecurity

    While generative AI has garnered much attention, it only represents a fragment of the rapidly evolving AI landscape. Security teams have recognized the potential AI has to transform cybersecurity, highlighted by the 92% of organizations that intend to use AI and machine learning to support cyber security. Download this e-book to learn more.

    Download