You've requested...

Unleashing the Freedom to Create in VFX

If a new window did not open, click here to view this asset.

Download this next:

Computer Weekly – 3 October 2017: Digitally preserving history

In this week’s Computer Weekly, we find out how cloud technologies are helping Gibraltar to digitally preserve historic documents and safeguard its cultural heritage. We examine progress on the roll-out of the new NHS national network. And our latest buyer’s guide looks at cloud-based ERP software.

Also in this issue:

  • Starling Bank’s CIO, John Mountain, talks about life at a business that is shaking up traditional IT thinking.
  • Healthcare and higher education have redefined customer relationship management software.
  • Members of the OpenStack community are struggling to upgrade the open source cloud operating system – could customisation be to blame?

These are also closely related to: "Unleashing the Freedom to Create in VFX"

  • Generative AI in the Enterprise

    Revolutionize Your Enterprise with Generative AI.

    Embrace the future of artificial intelligence with Dell Validated Designs for Generative AI with NVIDIA —a cutting-edge collaboration delivering scalable, modular generative AI solutions. Powered by NVIDIA’s advanced GPUs and software, Dell Validated Designs is aimed at propelling enterprises into the next era of AI innovation.

    Leverage large language models to automate customer service, enhance content creation, and drive data-driven decision-making. Don’t let your business fall behind—unlock the full potential of generative AI with the unparalleled performance and expertise of Dell and NVIDIA.

    Learn more.

  • Overcoming infrastructure challenges in production-class AI

    To shorten both time to insight and time to action, organizations are turning to artificial intelligence (AI) and analytics.

    While AI is hardly a new, unproven technology for most organizations, benefitting from production-scale AI workloads can be a formidable task.

    In this ESG white paper, discover the secrets to understanding and overcoming infrastructure challenges in production-class AI.

Find more content like what you just read:

  • Overcoming infrastructure challenges in production-class AI

    In this ESG white paper, discover the secrets to understanding and overcoming infrastructure challenges in production-class AI.

    Download

  • Deep learning vs. machine learning in cybersecurity

    This eBook compares the differences between deep learning and machine learning tools for cybersecurity, helping you determine which makes the most sense for your business. Read the eBook here.

    Download

  • Addressing EV charging infrastructure design challenges

    Explore solutions from TE Connectivity to address design challenges in EV charging infrastructure, including EMI mitigation, power distribution, and bi-directional charging. Read the full product overview to discover how TE Connectivity can power the future of mobility.

    Download

  • Redefine data visualization and insights with AI

    To accelerate insights, engage with predictive analytics, enable 3D visualization—these are three of the many AI use cases that businesses in all industries are tapping into. Take a look through this white paper to learn about one way that your organization can harness the power of AI: leveraging a PowerEdge server.

    Download

  • Navigating the Compliance Labyrinth with AI in Finance

    This e-book examines how AI can help financial institutions meet compliance mandates, fight fraud, and improve customer relationships. For example, AI can automate KYC processes, detect money laundering, and provide a holistic view of customers. Read the e-book to discover how AI can address your financial institution's key challenges.

    Download

  • Focus: Desktop virtualisation and mobility

    In this guide, we take a close look at how a number of CIO from a wide range of industries have sought to address the demand for mobile working within their organisations, and the technologies they have deployed to ensure data security and access is maintained at all times.

    Download

  • Top 10 artificial intelligence stories of 2019

    According to Gartner's 2019 CIO Agenda survey, organisations that have deployed artificial intelligence (AI) grew from 4% to 14% between 2018 and 2019. These are Computer Weekly's top 10 AI articles in 2019.

    Download

  • Top 10 datacentre stories of 2021

    The 2021 datacentre news cycle has been dominated by stories about how demand for hyperscale datacentre capacity is continuing to boom, while market watchers grow increasingly concerned about how all this growth is affecting the environment. With this in mind, here's a look back over Computer Weekly's top 10 datacentre stories of 2021.

    Download

  • The benefits of runtime application self-protection

    Traditional application security solutions lack visibility into runtime vulnerabilities, leading to ineffective threat detection and high false positives. Contrast Protect runtime application self-protection (RASP) provides accurate, embedded protection that reduces operational burden on security teams. Read the solution brief to learn more.

    Download

  • Breaking Free from Leads-Based Models

    To learn why and how to shift away from Marketing Qualified Leads (MQLs) and evolve your business’s revenue engine, read this e-book that features insights from Forrester VP and Principal Analyst Terry Flaherty.

    Download

  • Name Matching Software Tackles AML/KYC Challenges

    As financial institutions face increased AML/KYC challenges, Babel Street's AI-powered name matching software can help by reducing false positives, accelerating identity verification, and streamlining compliance workflows. Learn more about Babel Street Analytics Name Match in this eBook.

    Download

  • How CrowdStrike Falcon prevents data exfiltration with AI-based protection

    Discover a modern approach to confidently stopping data exfiltration in this product overview. This resource explores how CrowdStrike Falcon Data Protection provides deep visibility, simplified deployment, and effective, AI-powered data protection to secure sensitive data in cloud-first environments.

    Download

  • Deep learning for countering energy theft – a hybrid long-short term memory approach

    Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.

    Download

  • Media Consumption Study 2017 UKI

    The results of TechTarget and Computer Weekly's annual reader survey, which asks for feedback on readers' media consumption when considering an IT purchase, reveals the complexity of IT purchase decisions.

    Download

  • A better toolkit for finding & converting more real leads

    Though foundational to B2B marketing, lead generation can pose a couple significant obstacles. Along with unpacking those challenges, this 21-page e-book by TechTarget maps out 3 tips for driving stronger leads from your business’s lead generation strategy. To access those insights and more, dig into the book.

    Download

  • Tool sprawl: How an energy company reduced alerts by 40%

    The following case study highlights how Schneider Electric unified IT stack observability by working with LogicMonitor. Access the case study to view the full results, and learn how your business could similarly benefit from partnering with LogicMonitor.

    Download

  • CW APAC – Trend Watch: AI infrastructure

    Firms are starting to trust artificial intelligence in some of their most important processes. In this handbook, focused on AI infrastructure trends in the Asia-Pacific region, Computer Weekly looks at how it should be deployed, data and sustainability challenges and the advantages of large language models.

    Download

  • Enhancing Account Security and User Experience for Adobe

    Adobe enhanced its account registration security to detect and stop fraudulent accounts more effectively, while improving the user experience. Learn how they partnered with Arkose Labs to reduce fake accounts by 90% and increase good user throughput. Read the full case study.

    Download

  • AI disruption: Data center design for new workloads guidance

    This eBook analyzes impact of AI on data center design. Key takeaways: AI workloads driving higher rack densities; transition from air to liquid cooling needed; guidance on power, cooling, racks. Read the full eBook to learn best practices for AI-ready data centers.

    Download

  • 15 Minute Guide: Deliver Real Workforce Transformation with VDI

    This guide explores the Dell Technologies approach to empowering your remote workforce with secure, high-quality end-user experiences while streamlining how you deliver, protect and manage your VDI environment from edge to core to cloud.

    Download

  • Do you know the troubling truth about AppSec false positives?

    Discover in this white paper how to avoid alert fatigue and how to escape the failures of legacy AppSec tools.

    Download

  • How to Evaluate Threat Intelligence Feeds

    Know When Software Is Malware. With this guide, you will learn how to evaluate open source and commercial threat intelligence feeds to ensure you have relevant and useful information about malware, ransomware, Indicators of Compromise (IoC) and threat actors, so that your team can identify malicious events and reduce noisy, time-consuming alerts.

    Download

  • Computer Weekly – 27 April 2021: Justice at last in Post Office IT scandal

    In this week's Computer Weekly, 12 years after we broke the story, victims of the Post Office IT scandal finally have their criminal convictions overturned. We take a virtual tour of a Microsoft datacentre and meet a server called 'Mega-Godzilla Beast'. And we find out how technology is transforming Nationwide Building Society. Read the issue now.

    Download

  • Exhaustive Kubernetes e-book: 29 patterns for cloud app development

    This exhaustive O'Reilly e-book aims to help developers discover and learn about the most common patterns for creating cloud-native applications with Kubernetes. Read the book now, or save it for reference material in a pinch.

    Download

  • How Generative AI Can Transform the Public Sector

    Generative AI can transform the public sector by streamlining citizen services, boosting mission outcomes, and improving efficiency. This resource explores how public agencies can leverage foundation models and accelerated infrastructure to deploy generative AI. Read the full report to learn more.

    Download

  • Harness WAF & RASP for complete security protection

    Explore how combining Web Application Firewall (WAF) and Runtime Application Self-Protection (RASP) can provide comprehensive security against known and unknown vulnerabilities. Learn how RASP's runtime monitoring offers deeper protection than WAFs alone. Read the full e-book to learn more.

    Download

  • XDR For Dummies 2nd Edition

    Extended Detection and Response (XDR) For Dummies, 2nd Cisco Special Edition, explores the various types of threat detection and provides considerations for using a comprehensive approach to XDR. Learn how the Cisco approach to XDR can deliver strong levels of protection while simplifying the experience for your security team.

    Download

  • Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?

    In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.

    Download

  • Innovate faster with GPU-accelerated AI

    The ubiquity of AI—from advances in processing power to the rise of enterprise multicloud—enables enterprises to benefit from AI on-premises, in private and public clouds and at the edge for a variety of emerging workload.

    Download

  • When security forces collide: Managing speed and vulnerability balance

    Discover in this e-book what happens when speed and security forces collide, and find out what it means for organizations looking to update their security strategies.

    Download

  • Discover the 4 keys to successful AI projects

    Discover the four key things you need to know before starting an AI project. Learn how to de-risk your AI initiatives, upskill your team, and leverage a proven hybrid platform to achieve higher ROI. Read this e-book to unlock the full potential of AI for your enterprise.

    Download

  • AIRI—An NVIDIA DGX BasePOD certified reference architecture

    Download this e-book for a prescriptive reference architecture to help IT administrators to deploy a validated solution designed for inference, data exploration, and other computationally intensive algorithms that enable AI today.

    Download

  • Datacentre design: Building leaner, greener server farms

    The need for energy efficiency, resiliency and security have, for many years, been the driving forces behind the way that operators have approached building their datacentres. In this e-guide, we take a look at how the need for energy efficiency and sustainability is altering the way operators approach their datacentre builds and designs.

    Download

  • Computer Weekly - 17 March 2020: How NHS Digital is helping support the coronavirus crisis

    In this week's Computer Weekly, we talk to NHS Digital about how technology is supporting the health service's response to the coronavirus crisis. We examine the challenges of running a successful security operations centre. And we look at the emerging datacentre architecture based on composable infrastructure. Read the issue now.

    Download

  • Independent analysis of Bitdefender GravityZone

    Hackers are constantly advancing their tools and strategies to perform attacks more effectively. But when compared to those of hackers, how do your tools compare? This white paper presents the results of an independent test conducted by AV-Comparatives to provide an objective analysis of Bitdefender GravityZone. Read on to learn more.

    Download

  • Enterprise Strategy Group: How to secure your development practices

    This report from primary research and analyst firm Enterprise Strategy Group (ESG) outlines the significant consequences of failing to modernize your application security strategy and provides an actionable roadmap that developers can follow to secure their development practices from the outset.

    Download

  • The state of AI in cybersecurity

    While generative AI has garnered much attention, it only represents a fragment of the rapidly evolving AI landscape. Security teams have recognized the potential AI has to transform cybersecurity, highlighted by the 92% of organizations that intend to use AI and machine learning to support cyber security. Download this e-book to learn more.

    Download

  • Next-generation DAST: Introducing interactive application security testing (IAST)

    While dynamic application security testing (DAST) has been a go-to AppSec testing technique for decades, it is not without its drawbacks. This is where interactive application security testing (IAST) comes into play, building off of DAST, but analyzing apps from the inside out, rather than from the outside in. Read this white paper to learn more.

    Download

  • Deploy ML across the hybrid cloud without being limited by architecture

    Discover in this product overview how Red Hat OpenShift AI can help your team develop, train, test, and deploy ML across the hybrid cloud without being dragged down by limited architectural choices.

    Download

  • How to accelerate drug discovery with AI-enabled software in the cloud

    The drug discovery process is arduous and expensive, with a mere 10-12% of candidates succeeding, according to research by the Congressional Budget Office. This e-book reveals how Rescale, with AWS and NVIDIA, is aiding companies in tackling early research and clinical trial hurdles. Read on to discover the potential of generative AI in healthcare.

    Download

  • Perimeter Security Noise Leaves Applications Vulnerable to Attacks

    Learn how you can get AppSec protection that can compensate with the necessary visibility, accuracy, scalability, and ease of deployment to keep pace with modern application vulnerabilities without generating false positives and false negatives.

    Download

  • Computer Weekly – 23 January 2024: Davos 2024 – AI disinformation tops global risks

    In this week's Computer Weekly, AI-generated disinformation and misinformation will be the top risks for businesses, governments and the public over the next two years, according to the WEF. Intel's CTO discusses the chip maker's plans for the European market. And we examine the dearth of digital skills among elected officials. Read the issue now.

    Download

  • Defense-in-depth web AppSec: Exploring RASP and WAF benefits

    Explore the synergy of WAF and RASP for web application security in this white paper. Understand how a layered defense strategy effectively counters diverse threats. Read to learn about enhancing your security with WAF and RASP.

    Download

  • OWASP Top Ten: How to keep up

    The newest addition to the OWASP Top Ten was recently published to help organizations assess their application security efforts – but false positives could lead to unnecessary stress. Download now to learn how Contrast’s observability platforms is designed to keep up with the rapidly expanding scope of the OWASP Top Ten.

    Download

  • Pulse Survey: "Organizations Struggle to Measure and Monitor Cyber Risk"

    Data from this Harvard Business Review Pulse Survey, commissioned by Tanium, illuminates how effective cyber-risk oversight is hampered by the mutual shortage of knowledge between executives and cybersecurity leaders. Read the report to learn from top executives and analyze the data for yourself.

    Download

  • Your Red Hat Ansible Automation Platform starter kit

    In this e-book, discover everything you need to get started with Ansible Automation Platform, including key automation concepts, product features and capabilities, use cases for gaining value quickly, and strategies for implementing organization-wide automation.

    Download

  • How to accelerate the adoption of IoT within your organization

    In white paper, join Ensono analysts as they try to surface some of the most important elements to consider when rolling out IoT and how you can accelerate the adoption of IoT within your organization.

    Download