Take a look inside the next-generation data center
By: NetApp View more from NetApp >>
Download this next:
Venafi Study: Machine Identities Drive Rapid Expansion of Enterprise Attack Surface
By: Venafi & Intel
Type: White Paper
Digital transformation strategies have led to an explosion of machines needing unique identities to connect securely. But threat actors have learned that improperly managed machine identities are an ideal way to infiltrate and attack organizations. Read this study to learn why SSL/TLS, SSH and code signing machine identities so appeal to cybercriminals—and how an enterprise-wide machine identity management solution can stop them.
These are also closely related to: "Take a look inside the next-generation data center"
-
Managed Print Services in the Cloud
By: TechTarget ComputerWeekly.com
Type: Analyst Report
The office workplace has undergone a dramatic change in recent years. The key trends of mobility, BYOD and the cloud have driven users to expect more rapid access to corporate applications and services. The traditional IT delivery model is adapting to support these requirements, with businesses increasingly turning to cloud computing and managed services, attracted by the cost and efficiency benefits.
This report from analyst group Quocirca discusses how extending managed print services (MPS) to the cloud, through standardisation of infrastructure, virtualised server resources and automated processes, will be a major paradigm shift.
Contents:
- The need for MPS
- Tackling print server sprawl
- What is MPS in the cloud
-
Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
By: TechTarget ComputerWeekly.com
Type: Research Content
A side effect in dynamic random-access memory (DRAM) that occurs due to increased density, creating a challenge to prevent cell charges from interacting with adjacent cells, has evolved to the vulnerability called Rowhammer. Discover how it is used to exploit memory management techniques in different environments, inject errors in cryptographic protocols and perform privilege escalation attacks, and the counter-measures to help protect your organisation from attack.
Find more content like what you just read:
-
UKtech50: The most influential people in UK IT 2014 revealed
By: TechTarget ComputerWeekly.com
Type: eGuide
UKtech50 returned for its 5th year, showcasing the most influential people in UK IT and the rising stars in the industry. Read on to find out the top 50...
-
MicroScope January 2014: A special issue looking at software defined networking
By: TechTarget Security
Type: Ezine
The first issue of 2014 provides some insight in managed services, software defined networking, security and data centres
-
Future of Work
By: TechTarget ComputerWeekly.com
Type: Book
In this extract from his book, The Future of Work, Jacob Morgan looks at the five key factors shaping the way we work.
-
What does cloud computing look like in 2016?
By: TechTarget ComputerWeekly.com
Type: eGuide
Cloud computing today is in a phase of rapid take-up. Technology as a service is a top priority for CIOs in Southeast Asia.This guide gives examples of how cloud computing is being harnessed within the region.
-
Poland's Storage market on the rise
By: TechTarget ComputerWeekly.com
Type: eGuide
Poland's storage market has been on a steady rise but what's the reason behind this? We investigate...
-
Clients tell-all in Linux simplification and innovation for enterprises
By: TechTarget ComputerWeekly.com
Type: eBook
In this e-book, you will discover how to optimize server reliability, uptime, and IT manageability (and meet your SLAs) using an enterprise-grade Linux platform. Read on to ensure your business receives the processing power it needs to address increasingly sophisticated and demanding application requirements.
-
Developing the Intelligent Core with Windows Server 2019
By: Dell Technologies and Windows
Type: eGuide
65% of European CEOs are under significant pressure to deliver on their digital transformation (DX) strategies. Creating a digital platform with an intelligent core is key to success. Learn more about digital platforms inside this resource.
-
CW Nordics February 2019
By: TechTarget ComputerWeekly.com
Type: Ezine
In this ezine, we look at how digital transformation is shaking up the Nordic region and placing CIOs at the forefront of the social and economic changes that come with it. Norway, Denmark, Sweden and Finland are all heading in the same direction at pace and it appears this move is being fuelled by more traditional businesses.
-
Computer Weekly - 3 December 2019: Meet the most influential people in UK technology
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we reveal our 10th annual list of the 50 most influential people in UK technology, and profile this year's UKtech50 winner, Demis Hassabis, CEO and founder of AI pioneer DeepMind. Also: we examine how continuous software development can improve application security. Read the issue now.
-
CW Middle East July to Sept 2016:
By: TechTarget ComputerWeekly.com
Type: Ezine
In this issue of CW Middle East we look at how CIOs in the region are formulating their virtualisation strategies as organisations warm to the benefits of cloud computing.
-
Global Connectivity Index 2016
By: TechTarget ComputerWeekly.com
Type: Research Content
The Global Connectivity Index (GCI) 2016 from Huawei measures the progress of 50 nations in investing in and deploying Information and Communications Technology (ICT) to achieve economic digitisation
-
E-government benchmark 2016
By: TechTarget ComputerWeekly.com
Type: Essential Guide
The results of the latest e-government benchmark show a cautious acceleration of e-government implementation in Europe.
-
Computer Weekly 6 October 2020: The Most Influential Women in UK Technology 2020
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.
-
ITSM: Maintaining IT devices and applications
By: ServiceNow
Type: eGuide
This expert eGuide offers an inside look at IT service management, some of the benefits various support solutions offer and what you should look for in an ITSM tool. Also, engage in some opinions CIO's have on the subject of their ITSM pain points.
-
Technology, media and telecommunications predictions 2017
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Deloitte predicts the key trends in technology, media and telecommunications in 2017
-
Computer Weekly - 7 April 2020: Adapting IT to the new normal
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
-
Getting expense management right
By: TechTarget ComputerWeekly.com
Type: Analyst Report
Analysts Clive Longbottom and Rob Bamforth look at the benefits that every organisation should be looking to gain from a travel and expenses management system.
-
Computer Weekly – 12 July 2016: Watson gets to work
By: TechTarget ComputerWeekly.com
Type: Ezine
In this issue we explore the many ways Watson has evolved from the machine that bettered humans in Jeopardy! to providing deep analytical insights to solve real world crises. We also look at how Barclay's bank is using DevOps to remain competitive and reveal new research that illustrates why cloud computing is at the heart of business innovation.
-
Going big: why companies need to focus on operational analytics
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This report from Capgemini Consulting shows how the search for competitive advantage has driven organisations to shift the focus of their analytical efforts to back office operations
-
Middle East IT Priorities 2016
By: TechTarget ComputerWeekly.com
Type: eGuide
Computer Weekly's annual global survey of readers has once again revealed what CIOs around the world, including an increasing number of Middle East based IT leaders, are planning over the next 12 months.
-
Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated
By: TechTarget ComputerWeekly.com
Type: Resource
This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.
-
Computer Weekly – 1 October 2019: The most influential women in UK technology
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.
-
CW Nordics ezine November 2018
By: TechTarget ComputerWeekly.com
Type: Ezine
Given the controversy surrounding some recent elections and fears of interference by foreign actors, it is hardly surprising that the Swedish government is seeking support from the IT sector as it attempts to guarantee elections remain trustworthy.
-
Live-video support tools: Changing the game for remote support
By: LogMeIn Rescue Lens
Type: eGuide
With an explosion of IoT devices and continued growth of IT consumerization, market researchers see an opportunity for vendors with new-age remote support products. Uncover independent analysts' opinions of a live-video support tool and understand how it differentiates from competitors like Apple's FaceTime or Google Hangouts.
-
Computer Weekly 19 February 2019: When is it best to stick with paper?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, sometimes going digital is not necessarily the best thing to do – we weigh the pros and cons of paper versus technology. Our new buyer's guide examines the challenges of asset management as you move to the cloud. And we look at the growing role of software developers in the future of networking. Read the issue now.
-
IT Project: Migration to cloud
By: TechTarget ComputerWeekly.com
Type: eGuide
The benefits of using cloud are well-known, but the challenges and barriers enterprises come up against during their move off-premise can be wide, varied and unexpected. Knowing how best to negotiate these issues can help speed up the process of shifting workloads and applications to the cloud immeasurably.
-
Global Risks Report 2017
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals
-
Network Evolution: Software-defined networking in action
By: TechTarget Networking
Type: Ezine
To fully take hold of your business intelligence it is important to deploy a set of network monitoring tools. This expert e-guide focuses on specific network monitoring tools and the benefits they will bring to your organizations.
-
Mobile Web 2.0 - opportunities in advertising and presence-based services
By: TechTarget Security
Type: White Paper
The mobilisation of Web 2.0 is fostering new partnerships and rivalries throughout the value chain.
-
IT Project: Virtualisation
By: TechTarget ComputerWeekly.com
Type: eGuide
Virtualisation, in all its forms, has dramatically changed the way enterprise datacentres are operated, managed and built over the course of the past decade or so.
-
Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018
By: TechTarget ComputerWeekly.com
Type: Resource
David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.
-
UKtech50 2018: The 50 most influential people in UK IT
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, you will find our definitive list of the movers and shakers in UK IT – the CIOs, industry executives, public servants and business leaders driving the role of technology in the UK economy. This is our top 50 most influential people in UK IT for 2019.
-
Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now.
-
UK IT Priorities 2016
By: TechTarget ComputerWeekly.com
Type: eGuide
Every year, Computer Weekly and TechTarget conduct a global survey of our readers to understand their technology spending priorities for the coming 12 months. Our research offers a unique insight into the purchasing decisions of IT decision-makers worldwide.
-
A Computer Weekly buyer's guide to public open data
By: TechTarget ComputerWeekly.com
Type: Essential Guide
The 11-page buyer's buyers guide looks at the latest the in the publication and use of open data by government and the private sector.
-
UKTech50 2021 - The most influential people in UK technology
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide: Computer Weekly has announced the 11th annual UKtech50, our definitive list of the movers and shakers in UK technology – the CIOs, industry executives, public servants and business leaders driving the role of technology in the UK economy.
-
Manage and provision storage for DevOps
By: TechTarget Storage
Type: Ezine
Today's DevOps teams need to more easily manage and provision storage. Discover how application delivery processes have received a boost from the emergence of intelligent data storage and cloud storage.
-
5 considerations for evaluating your database strategy
By: Aerospike
Type: eBook
As their data volumes increase, organizations may choose to evaluate if their database, such as Redis, can support their evolving needs. This 28-page e-book explores 5 considerations to keep in mind during that evaluation. Dig into the book to unlock those insights.
-
Hacking the Human Operating System
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
-
CW Europe – December 2018
By: TechTarget ComputerWeekly.com
Type: Ezine
Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
-
CW Benelux - May-July 2019: A new vision for hackers
By: TechTarget ComputerWeekly.com
Type: Ezine
With canal bridges, healthcare products, bicycles, ship components, buildings and even prosthetic body parts already in the scope of 3D printing, it's facinating to imagine how far the technology can go. Printing spaceships is no longer a fantasy. Read the issue now.
-
The technological evolution of IT industry leaders: Part one
By: TechTarget ComputerWeekly.com
Type: eGuide
This first part of this e-guide explores the technological evolution of Oracle, Cisco and Dell throughout the past two decades, including the technologies that have risen to the forefront, from real-time analytics and data management to Cisco's edge computing ambitions.
-
CW Europe - December 2021-February 2022: Norway embraces internet of things
By: TechTarget ComputerWeekly.com
Type: Ezine
Norway is becoming a centre of IoT innovation as tech developers tackle some of the country's unique challenges, in areas such as fish farming, power distribution and monitoring of boats.
-
Serverless computing: What enterprises need to know
By: TechTarget ComputerWeekly.com
Type: eGuide
As the use of public cloud services has gathered steam within enterprises, so too has interest among IT leaders about embracing the principles of serverless computing. In this e-guide we take a closer look at the benefits and pitfalls of serverless, while shining a light on the ways that enterprises across the globe are putting it to use.
-
Policing cyber crime
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
-
Europe IT Priorities 2016
By: TechTarget ComputerWeekly.com
Type: eGuide
Every year, Computer Weekly and TechTarget conduct a global survey of our readers to understand their technology spending priorities for the coming 12 months. Our research offers a unique insight into the purchasing decisions of IT decision-makers worldwide.
-
A Computer Weekly buyer's guide to datacentre cooling
By: TechTarget ComputerWeekly.com
Type: eGuide
Effective cooling methods are essential for the running of the datacentre. In this 16-page buyer's guide, Computer Weekly looks at how to power them efficiently, the potential of a shift to liquid cooling systems and the most cost-effective methods of datacentre cooling.