You've requested...

Keeping Remote Teams Connected and Productive

If a new window did not open, click here to view this asset.

Download this next:

Intelligent Session Control for the Enterprise

Today’s enterprises strive to maintain and improve customer service while enabling more efficient employee collaboration.

Access this white paper to learn how you can achieve this by optimizing the use of network resources and simplifying network operations with intelligent session and routing control solutions leveraging the Ribbon PSX.

These are also closely related to: "Keeping Remote Teams Connected and Productive"

  • Focus: Desktop virtualisation and mobility

    As enterprises look to tap into the productivity benefits that come from enabling their employees to use smartphones and tablets to get their day-to-day work done, interest in the use of desktop virtualisation technologies has risen accordingly. Desktop virtualisation, after all, allows organisations to run virtual machines on their PCs, smartphones and tablets to provide their employees with access to a wide range of work applications wherever and whenever they need them. Applications deployed in an environment such as this are often considered to be easier to update, while making the process of managing and storing corporate date on employee devices easier to do. In this guide, we take a close look at how a number of CIO from a wide range of industries have sought to address the demand for mobile working within their organisations, and the technologies they have deployed to ensure data security and access is maintained at all times.

  • Top 10 datacentre stories of 2021

    The 2021 datacentre news cycle has been dominated by stories about how demand for hyperscale datacentre capacity is continuing to boom, while market watchers grow increasingly concerned about how all this growth is affecting the environment. With this in mind, here's a look back over Computer Weekly's top 10 datacentre stories of 2021.

    - Cloud and datacentre giants unite to create climate neutral EU datacentre industry by 2030
    - Government gets updated powers to intervene on tech-related M&A deals on national security grounds
    - OVHcloud confirms no casualties following fire at Strasbourg datacentre campus
    - Average size of hyperscale datacentres is on the rise
    - Climate change and datacentres: Weighing up water use
    - The Cambridge-1 switch-on: UK’s most powerful supercomputer goes live
    - QTS acquired in $10bn datacentre deal
    - Government flags opportunity for re-use of waste datacentre heat in net-zero strategy
    - Dublin in distress: Power supply issues threaten growth of Europe’s second-biggest datacentre hub
    - The second coming: The Nordic datacentre market comes of age

Find more content like what you just read:

  • Accelerating AI Insights With PowerEdge Servers

    To accelerate insights, engage with predictive analytics, enable 3D visualization—these are three of the many AI use cases that businesses in all industries are tapping into. Take a look through this white paper to learn about one way that your organization can harness the power of AI: leveraging a PowerEdge server.

    Download

  • Creating a purpose-built AI infrastructure platform

    While AI is hardly a new, unproven technology for most organizations, driving value from production-scale AI workloads can be a formidable task. In this analyst white paper, you’ll learn how you can deliver a purpose-built AI infrastructure platform designed to stand up to the rigors of production-class AI. Read on to learn more.

    Download

  • Deep learning for countering energy theft – a hybrid long-short term memory approach

    Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.

    Download

  • Top 10 artificial intelligence stories of 2019

    According to Gartner's 2019 CIO Agenda survey, organisations that have deployed artificial intelligence (AI) grew from 4% to 14% between 2018 and 2019. These are Computer Weekly's top 10 AI articles in 2019.

    Download

  • Datacentre design: Building leaner, greener server farms

    The need for energy efficiency, resiliency and security have, for many years, been the driving forces behind the way that operators have approached building their datacentres. In this e-guide, we take a look at how the need for energy efficiency and sustainability is altering the way operators approach their datacentre builds and designs.

    Download

  • How AI is changing the way data centers are designed

    Artificial intelligence (AI) deployments are taking up an increasingly large portion of data center workloads. This paper explains relevant attributes and trends of AI workloads and describes the resulting data center challenges, including Guidance for how to address these challenges. Read on to learn more.

    Download

  • Pipeline-native scanning for modern application development

    Tap into this white paper to learn about an approach to application security that uses demand-driven static analysis to automatically triage vulnerabilities according to next-step actions within a modern development environment.

    Download

  • Activate real-time insights

    This white paper discusses the challenges of creating value from data at the edge and how HPE can help you take action to accelerate data insights, results, and value. Access the paper to learn how to supercharge applications so you can act in real-time and analyze data from all your sources using a data fabric to unify analytics.

    Download

  • Analyst report: 239% ROI from IBM Security Qradar SIEM

    As cyberthreats proliferate, so do security alerts. Because of this, security analysts are pressed to quickly and thoroughly investigate frequent incidents. In this Forrester TEI report, learn how analysts have saved 90% more time when investigating incidents.

    Download

  • Maximizing return on cloud investments: The 5 questions to ask yourself

    In order to maximize returns on your cloud investment, first, you need to choose the right cloud for your workloads. So, how do you do that? Begin your journey by answering the 5 questions in this white paper.

    Download

  • Deep learning vs. machine learning in cybersecurity

    This eBook compares the differences between deep learning and machine learning tools for cybersecurity, helping you determine which makes the most sense for your business. Read the eBook here.

    Download

  • 7 advantages of a SaaS-based application security program

    In this infographic, discover 7 advantages of a SaaS-based application security program vs. on-premises.

    Download

  • Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?

    In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.

    Download

  • Enable enterprise level performance for your AI architecture

    To unleash the full potential of GPU-powered AI-based data science, organizations must revamp their legacy IT infrastructures to enable fast access to the right data. Access this product overview to discover a complete AI infrastructure solution designed to uncomplicate your data and help you get the most out of your AI investments.

    Download

  • Computer Weekly – 27 April 2021: Justice at last in Post Office IT scandal

    In this week's Computer Weekly, 12 years after we broke the story, victims of the Post Office IT scandal finally have their criminal convictions overturned. We take a virtual tour of a Microsoft datacentre and meet a server called 'Mega-Godzilla Beast'. And we find out how technology is transforming Nationwide Building Society. Read the issue now.

    Download

  • Breaking Free from Leads-Based Models

    To learn why and how to shift away from Marketing Qualified Leads (MQLs) and evolve your business’s revenue engine, read this e-book that features insights from Forrester VP and Principal Analyst Terry Flaherty.

    Download

  • Media Consumption Study 2017 UKI

    The results of TechTarget and Computer Weekly's annual reader survey, which asks for feedback on readers' media consumption when considering an IT purchase, reveals the complexity of IT purchase decisions.

    Download

  • 5 principles for securing DevOps

    Integrating security operations into pre-existing DevOps processes can yield numerous business benefits – including a measurable growth in both profit and revenue. Read this whitepaper to unlock the 5 principles of DevSecOps to help you get started.

    Download

  • Computer Weekly - 17 March 2020: How NHS Digital is helping support the coronavirus crisis

    In this week's Computer Weekly, we talk to NHS Digital about how technology is supporting the health service's response to the coronavirus crisis. We examine the challenges of running a successful security operations centre. And we look at the emerging datacentre architecture based on composable infrastructure. Read the issue now.

    Download

  • A better toolkit for finding & converting more real leads

    Though foundational to B2B marketing, lead generation can pose a couple significant obstacles. Along with unpacking those challenges, this 21-page e-book by TechTarget maps out 3 tips for driving stronger leads from your business’s lead generation strategy. To access those insights and more, dig into the book.

    Download

  • Third-Party Analyst Product Review: Chronicle SIEM

    SANS conducted a review of Chronicle, Google’s cloud-native security operations suite, with a focus on evaluating its SIEM features and usability from a practitioner perspective.

    Download

  • The Evolution of Threat Detection and Management

    This e-guide from SearchSecurity.com explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.

    Download

  • Computer Weekly – 23 July 2019: How Apollo 11 influenced modern computing

    In this week's Computer Weekly, on the 50th anniversary of the Moon landings we look at the influence Apollo 11 had on modern hardware and software. Our latest buyer's guide examines data protection. And we find out how retailers with physical stores are using technology to respond to the rise of online shopping. Read the issue now.

    Download

  • Can AI take education to a new level?

    In this week's Computer Weekly, we examine how LLMs are being used to teach, support and assess students, enhancing education rather than impairing it. We look at how AI is impacting the semiconductor sector as big tech companies put off server upgrades. And we find out how GenAI is changing the way enterprise software works. Read the issue now.

    Download

  • How to accelerate the adoption of IoT within your organization

    In white paper, join Ensono analysts as they try to surface some of the most important elements to consider when rolling out IoT and how you can accelerate the adoption of IoT within your organization.

    Download

  • Computer Weekly – 23 January 2024: Davos 2024 – AI disinformation tops global risks

    In this week's Computer Weekly, AI-generated disinformation and misinformation will be the top risks for businesses, governments and the public over the next two years, according to the WEF. Intel's CTO discusses the chip maker's plans for the European market. And we examine the dearth of digital skills among elected officials. Read the issue now.

    Download

  • A Computer Weekly buyer's guide to deep learning

    Deep learning can help companies operate faster and more efficiently. In this 13-page buyer'sguide, Computer Weekly looks at the advanced tools available for developers building intelligentapps, the frameworks that can be used and the kit that can enhance a programmer's toolbox.

    Download

  • How GenAI impacts cybersecurity: 2023 research report

    69% of businesses have adopted generative AI (GenAI) tools, according to the fourth edition of the 2023 “Voice of SecOps” report. This massive adoption rate begs an important question: Is GenAI a friend or foe – or both – of cybersecurity? Find an answer in this report.

    Download

  • AI/ML deployment: How to overcome key challenges

    In this e-book, you’ll discover how you can leverage the transformative power of artificial intelligence (AI), machine learning (ML), and deep learning (DL) to make the most of your data. Read on to learn how you can overcome the most troublesome deployment challenges and build a production-ready AI/ML environment.

    Download

  • AWS Quickly and Easily Scale and Secure Your Serverless Applications

    According to Forrester, 25% of developers will be using serverless technologies by next year. However, many organizations have concerns about how legacy application security approaches can support serverless applications. Discover the new serverless security trends that have been cropping up in response to these concerns in this report.

    Download

  • Monetize your 5G investment: A guide for CSPs

    In this white paper, discover how communications service providers (CSPs) can supercharge 5G and IoT monetization.

    Download

  • Top AI/ML use cases across industries

    In a digital world, your data can be a critical competitive advantage, but collecting data is only the starting point—how you use your data is the real differentiator. Learn how building a production-ready AI/ML environment can help you employ data to deliver business insights, automate tasks, and advance system capabilities.

    Download

  • Computer Weekly - 24 August 2021: How datacentre power growth is leaving Dublin in distress

    In this week's Computer Weekly, we look at the challenges faced by Dublin's datacentre sector, as growth leaves the city's electricity infrastructure creaking. We ask whether recent initiatives to close the UK's digital skills gaps are working. And we examine the latest injustice to hit the Post Office Horizon scandal. Read the issue now.

    Download

  • Aligning risk & service models for operational resilience

    Integrating an entity hierarchy into risk management aligns with CMDB and CSDM for risk visibility. Maturing from tactical to service-centric, it includes third parties, enhancing accountability and transparency. Read to build a robust framework aligned with business services and infrastructure.

    Download

  • MDR Buyer’s Guide

    When evaluating MDR vendors, organizations should consider several elements, from the provider’s investigation and response capabilities to their depth of detection and beyond. This guide goes through the top questions you should be asking before making your final selection.

    Download

  • Computer Weekly – 25 February 2020: Using meteorological data to prepare for the worst

    In this week's Computer Weekly, after the storms that swept across the UK, we look at the technology behind Weather Source's meteorological data service. Oracle and SAP are battling over customers to upgrade their ERP systems to the cloud. And we report from the world's biggest retail tech show.

    Download

  • Computer Weekly - 13 July 2021: Driving intelligence - behind the scenes of Volkswagen's in-car software

    In this week's Computer Weekly, we go behind the scenes of Volkswagen's in-car software R&D centre. The UK's largest supercomputer has gone live in Cambridge – we find out how it will transform healthcare research. And we talk to DWP's digital chief about the restructuring of its IT capabilities. Read the issue now.

    Download

  • Next-generation DAST: Introducing interactive application security testing (IAST)

    While dynamic application security testing (DAST) has been a go-to AppSec testing technique for decades, it is not without its drawbacks. This is where interactive application security testing (IAST) comes into play, building off of DAST, but analyzing apps from the inside out, rather than from the outside in. Read this white paper to learn more.

    Download

  • Enterprise Strategy Group: How to secure your development practices

    This report from primary research and analyst firm Enterprise Strategy Group (ESG) outlines the significant consequences of failing to modernize your application security strategy and provides an actionable roadmap that developers can follow to secure their development practices from the outset.

    Download

  • Independent analysis of Bitdefender GravityZone

    Hackers are constantly advancing their tools and strategies to perform attacks more effectively. But when compared to those of hackers, how do your tools compare? This white paper presents the results of an independent test conducted by AV-Comparatives to provide an objective analysis of Bitdefender GravityZone. Read on to learn more.

    Download

  • Perimeter Security Noise Leaves Applications Vulnerable to Attacks

    Learn how you can get AppSec protection that can compensate with the necessary visibility, accuracy, scalability, and ease of deployment to keep pace with modern application vulnerabilities without generating false positives and false negatives.

    Download

  • OWASP Top Ten: How to keep up

    The newest addition to the OWASP Top Ten was recently published to help organizations assess their application security efforts – but false positives could lead to unnecessary stress. Download now to learn how Contrast’s observability platforms is designed to keep up with the rapidly expanding scope of the OWASP Top Ten.

    Download

  • Unlocking the Opportunity of SIEM Technology

    Explore how a security information and event management (SIEM) system works, what types of data you can integrate into it, the process for detecting threats/incidents, and steps you should take to develop a successful SIEM capabilities.

    Download

  • Breaking the cycle of reactionary cybersecurity

    While security teams strive to combat new threats as fast as they can, as long as their approach is reactionary, hackers will always have the upper hand. This white paper examines how the adoption of AI and ML presents an opportunity to overcome reactionary approaches and achieve proactive anti-malware security. Read on to learn more.

    Download

  • Back to the Basics, Other Payment Integrity Strategies Post-PHE

    Fraud in healthcare isn't as black and white as in other industries, so providers need a comprehensive payment integrity strategy after the COVID-19 public health emergency. The back-to-the-basics approach has become a good choice after the expiration of the PHE. Download the article to read more.

    Download

  • The metaverse explained: Everything you need to know

    The metaverse is considered to be the next evolution of the internet, and its possibilities are virtually infinite to those who learn how to master this new digital universe. In this infographic, we put together everything you need to know about the metaverse.

    Download

  • Computer Weekly – 11 February 2020: How the Post Office caused so much misery

    In this week's Computer Weekly, after a landmark legal victory against the Post Office over a faulty IT system, campaigner Alan Bates shares his 20-year story of trials and triumph. Oracle is under fire over its cloud sales practices – we examine the claims. And we look at the sustainability challenges for datacentres.

    Download