Hardware-virtualized GPU: the solution to your VDI deployment
By: HPE and AMD View more from HPE and AMD >>
Download this next:
Can AI take education to a new level?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week’s Computer Weekly, we examine how large language models are being used to teach, support and assess students, enhancing education rather than impairing it. We look at how the AI revolution is impacting the semiconductor sector as the big tech companies put off server upgrades. And we find out how generative AI is changing the way enterprise software works. Read the issue now.
These are also closely related to: "Hardware-virtualized GPU: the solution to your VDI deployment"
-
Accelerating AI Insights With PowerEdge Servers
By: FCN
Type: White Paper
To accelerate insights, engage with predictive analytics, enable 3D visualization—these are three of the many AI use cases that businesses in all industries are tapping into.
Along with delving into those use cases, this white paper explores one way that your organization can harness the power of AI: leveraging a PowerEdge server.
So, how does such a server work, and what benefits can it afford your business?
Take a look through the paper to unlock answers.
-
How to choose the right HPE server for evolving workloads
By: AMD
Type: Video
Trying to figure out which server is right for your growing organization’s evolving needs?
Don’t get bogged down comparing solutions and trying to discern which is appropriate for various workloads; let HPE and AMD do the heavy lifting for you.
In this informative video, HPE experts compare ProLiant Gen11 servers with AMD EPYC processors, giving you close look at each of the platforms so you can choose the right solution for your organization’s unique workloads.
Find more content like what you just read:
-
Solve the HPC bottleneck for AI from HPE and AMD
By: AMD
Type: Product Overview
Discover in this product overview how Hewlett Packard Enterprise and AMD answer the AI/ML infrastructure bottleneck with the latest line of HPE ProLiant Gen11 servers built on the latest generation of AMD EPYC processors.
-
Datacentre design and facilities: What you need to know
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we take a look at some of the latest thinking and trends around datacentre design, while shining a light on the differing approaches organisations take to ensure their server farms remain up and running, and can withstand all the compute demands expected of them.
-
Deep learning for countering energy theft – a hybrid long-short term memory approach
By: TechTarget ComputerWeekly.com
Type: Research Content
Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.
-
Infrastructure optimisation for business application management
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we take a look at some of the latest trends in server hardware design and specifications to help IT buyers make an informed choice about the best infrastructure to run their portfolios of business applications on.
-
CIO Trends #10: Middle East
By: TechTarget ComputerWeekly.com
Type: eGuide
If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes are a big one. Also find out how Saudi Arabia could become the Silicon Valley of the Middle East. Read more about it in this issue of our CIO Trends Middle East series.
-
CIO Trends #10: Benelux
By: TechTarget ComputerWeekly.com
Type: eGuide
If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes is a big one. Also find out how close autonomous ships are to regularly docking in Dutch ports. Read more about it in this issue of our CIO Trends Benelux series.
-
Pipeline-native scanning for modern application development
By: Contrast Security
Type: White Paper
Tap into this white paper to learn about an approach to application security that uses demand-driven static analysis to automatically triage vulnerabilities according to next-step actions within a modern development environment.
-
How to unlock the full potential of your machine learning environment
By: AMD
Type: White Paper
Discover in this white paper how your organization can unleash software-accelerated AI inference with Neural Magic on HPE ProLiant Gen11 servers powered by 4th Gen AMD EPYC processors.
-
How to survive the data tidal wave with HPE and AMD
By: AMD
Type: Product Overview
Discover in this product overview how HPE and AMD can offer your organization a rock-solid foundation for a robust data analytics program, providing flexibility and speed to boost data and analytics capabilities, generate real-time data insights, and improve operational efficiency and user experiences.
-
Analyst report: 239% ROI from IBM Security Qradar SIEM
By: Ironside Group
Type: Forrester Total Economic Impact Report
As cyberthreats proliferate, so do security alerts. Because of this, security analysts are pressed to quickly and thoroughly investigate frequent incidents. In this Forrester TEI report, learn how analysts have saved 90% more time when investigating incidents.
-
Computer Weekly – 24 April 2018: London plans to be a smarter city
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we meet the first ever chief digital officer for London and find out his plans to make the capital a smarter city. SAP has overhauled its controversial indirect licensing policy – we look at the implications. And what are the jobs of the future in retail as the sector is transformed by technology? Read the issue now.
-
Maximizing return on cloud investments: The 5 questions to ask yourself
By: Akamai
Type: White Paper
In order to maximize returns on your cloud investment, first, you need to choose the right cloud for your workloads. So, how do you do that? Begin your journey by answering the 5 questions in this white paper.
-
Computer Weekly - 7-13 January 2020: Digital fashion reality - how technology can help people enjoy fashion in a more sustainable way
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we report on a programme to get more young women into cyber security. We look at fashion for online personas. And we examine edge computing as the new data frontier, and how cloud-native platforms and AI might transform the datacentre. Read the issue now.
-
Deep learning vs. machine learning in cybersecurity
By: Deep Instinct
Type: eBook
This eBook compares the differences between deep learning and machine learning tools for cybersecurity, helping you determine which makes the most sense for your business. Read the eBook here.
-
7 advantages of a SaaS-based application security program
By: Veracode, Inc.
Type: Resource
In this infographic, discover 7 advantages of a SaaS-based application security program vs. on-premises.
-
Computer Weekly – 27 June 2023: The politics of AI
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, Rishi Sunak and Keir Starmer both spoke at London Tech Week to present their visions of an AI future for the UK – we compare their plans. We talk to the CTO of chip giant AMD about making tech more energy efficient. And we look at optimising networks for hybrid working. Read the issue now.
-
CW EMEA July 2023: Can we trust AI?
By: TechTarget ComputerWeekly.com
Type: Ezine
Artificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public.
-
MicroScope January 2014: A special issue looking at software defined networking
By: TechTarget Security
Type: Ezine
The first issue of 2014 provides some insight in managed services, software defined networking, security and data centres
-
5 principles for securing DevOps
By: Veracode, Inc.
Type: White Paper
Integrating security operations into pre-existing DevOps processes can yield numerous business benefits – including a measurable growth in both profit and revenue. Read this whitepaper to unlock the 5 principles of DevSecOps to help you get started.
-
Media Consumption Study 2017 UKI
By: TechTarget ComputerWeekly.com
Type: eGuide
The results of TechTarget and Computer Weekly's annual reader survey, which asks for feedback on readers' media consumption when considering an IT purchase, reveals the complexity of IT purchase decisions.
-
CW Nordics February 2019
By: TechTarget ComputerWeekly.com
Type: Ezine
In this ezine, we look at how digital transformation is shaking up the Nordic region and placing CIOs at the forefront of the social and economic changes that come with it. Norway, Denmark, Sweden and Finland are all heading in the same direction at pace and it appears this move is being fuelled by more traditional businesses.
-
Unify your cloud experience
By: Hewlett Packard Enterprise
Type: White Paper
Despite the overall success of many applications in the cloud, 72% of IT leaders and decision-makers now report they have moved some back on-premises. But what is the best balance of workload distribution? Access this white paper to learn more.
-
Computer Weekly – 1 August 2017: The fields of Athenry – how Apple's datacentre plans are causing turmoil in a small Irish town
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look into Apple's controversial plans to build a huge datacentre in a small town in the west of Ireland, and the local arguments it has caused. We find out how the Met Office is managing its vast quantities of weather data. And we examine Google plans to bring AI to the recruitment market. Read the issue now.
-
AWS Quickly and Easily Scale and Secure Your Serverless Applications
By: Contrast Security
Type: White Paper
According to Forrester, 25% of developers will be using serverless technologies by next year. However, many organizations have concerns about how legacy application security approaches can support serverless applications. Discover the new serverless security trends that have been cropping up in response to these concerns in this report.
-
Drive Powerful AI Insights with an Open Ecosystem
By: Dell Technologies & AMD
Type: Product Overview
Running the AMD Instinct™ MI300X accelerator and the AMD Radeon Open Compute (ROCm™) open software platform on the Dell PowerEdge XE9680 Server provides you with a powerful ecosystem option — an open path forward — to spark opportunity and unleash your potential.
-
Independent analysis of Bitdefender GravityZone
By: Bitdefender
Type: White Paper
Hackers are constantly advancing their tools and strategies to perform attacks more effectively. But when compared to those of hackers, how do your tools compare? This white paper presents the results of an independent test conducted by AV-Comparatives to provide an objective analysis of Bitdefender GravityZone. Read on to learn more.
-
Aligning risk & service models for operational resilience
By: ServiceNow
Type: White Paper
Integrating an entity hierarchy into risk management aligns with CMDB and CSDM for risk visibility. Maturing from tactical to service-centric, it includes third parties, enhancing accountability and transparency. Read to build a robust framework aligned with business services and infrastructure.
-
Enterprise Strategy Group: How to secure your development practices
By: Contrast Security
Type: ESG Showcase
This report from primary research and analyst firm Enterprise Strategy Group (ESG) outlines the significant consequences of failing to modernize your application security strategy and provides an actionable roadmap that developers can follow to secure their development practices from the outset.
-
Computer Weekly - 22 February 2022: Think nation-state cyber attacks won't hit you? Think again...
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, with Russian state cyber attacks in the news, we find out why security professionals in every organisation need to remain alert. Our buyer's guide looks at the tools and programmes helping improve IT training. And we look at how the traditional sport of golf is undergoing a digital transformation. Read the issue now.
-
Next-generation DAST: Introducing interactive application security testing (IAST)
By: Contrast Security
Type: White Paper
While dynamic application security testing (DAST) has been a go-to AppSec testing technique for decades, it is not without its drawbacks. This is where interactive application security testing (IAST) comes into play, building off of DAST, but analyzing apps from the inside out, rather than from the outside in. Read this white paper to learn more.
-
Perimeter Security Noise Leaves Applications Vulnerable to Attacks
By: Contrast Security
Type: White Paper
Learn how you can get AppSec protection that can compensate with the necessary visibility, accuracy, scalability, and ease of deployment to keep pace with modern application vulnerabilities without generating false positives and false negatives.
-
How to choose the right PC for today’s employees
By: Connection
Type: eGuide
This custom TechTarget e-guide is meant to help IT decision-makers choose the right PC for their business, comprised of key considerations, best practices, and comprehensive component and feature lists for the top market options. Download your copy now to learn how to manage your PCs and modernize the end-user experience.
-
Computer Weekly – 20 March 2018: Where neuroscience meets technology
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
-
Reduce CAPEX by 46% without sacrificing data center performance
By: AMD
Type: Infographic
Discover in this infographic how AMD can help you can achieve up to 46% CAPEX reduction with 35% fewer servers, all while consuming 29% less energy.
-
OWASP Top Ten: How to keep up
By: Contrast Security
Type: eBook
The newest addition to the OWASP Top Ten was recently published to help organizations assess their application security efforts – but false positives could lead to unnecessary stress. Download now to learn how Contrast’s observability platforms is designed to keep up with the rapidly expanding scope of the OWASP Top Ten.
-
Supporting top LLM families with AMD EPYC 9654
By: AMD
Type: Video
Discover in this short video how AMD EPYC 9654 delivers industry-leading AI inferencing performance with some of today’s top LLM models.
-
Protect against attacks with superior detection
By: Crytica Security, Inc.
Type: Product Overview
Research shows that the average time it takes for an organization to detect a cyber infiltration is 180 days. Crytica brings to the cybersecurity arsenal a new and powerful detection technology that can help reduce this ‘dwell time’ so you can stop attacks before it’s too late. Read on to learn more.
-
Breaking the cycle of reactionary cybersecurity
By: Deep Instinct
Type: White Paper
While security teams strive to combat new threats as fast as they can, as long as their approach is reactionary, hackers will always have the upper hand. This white paper examines how the adoption of AI and ML presents an opportunity to overcome reactionary approaches and achieve proactive anti-malware security. Read on to learn more.
-
The next wave of IoT in Asia: What to expect in 2018
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read about the APAC businesses that have successfully implemented IoT initiatives and are already reaping the benefits, such as achieving increased ROI and reducing operational disruptions.
-
The metaverse explained: Everything you need to know
By: TechTarget ComputerWeekly.com
Type: Infographic
The metaverse is considered to be the next evolution of the internet, and its possibilities are virtually infinite to those who learn how to master this new digital universe. In this infographic, we put together everything you need to know about the metaverse.
-
E-Book: Virtualizing Your Infrastructure - Selecting Server Hardware for Virtualization
By: TechTarget Data Center
Type: eBook
Choosing the right server hardware to maximize virtualization benefits is an important investment. To gain the high consolidation ratios you're after, you need powerful-enough hardware to support your workloads and applications. In this expert ebook, explore the hardware consideration to keep in mind as you virtualize.
-
The ever-increasing necessity: File upload security
By: Deep Instinct
Type: White Paper
Organizations accept files through their web applications to run their business. But, files being uploaded by customers could contain malware or some other risk that could hurt your business. What is scarier is that 80% of successful breaches come from zero-day attacks. Read on to learn more and don’t let malicious files stay like uninvited guests.
-
Building the foundation of a mature threat hunting program
By: Tanium
Type: eBook
Many of today’s organizations are at the mercy of their third-party partners’ security as well as their own. Read this e-book, Building the Foundation of a Mature Threat Hunting Program, to learn effective hunting strategies and how to address critical visibility and data gaps.
-
Computer Weekly – 23 January 2024: Davos 2024 – AI disinformation tops global risks
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, AI-generated disinformation and misinformation will be the top risks for businesses, governments and the public over the next two years, according to the WEF. Intel's CTO discusses the chip maker's plans for the European market. And we examine the dearth of digital skills among elected officials. Read the issue now.
-
How you can best combat false payments & more
By: checkout.com
Type: White Paper
When 45% of today’s consumers report that they won’t retry a payment after one false decline (and most often take their business to a competitor), it has become critical for businesses to make sure that they have their payment processes locked down. But how can this best be done? Browse this white paper to learn more.
-
Five Tips to Improve a Threat and Vulnerability Management Program
By: TechTarget Security
Type: eGuide
Access this e-guide for 5 expert tips to improve the effectiveness of an enterprise threat and vulnerability management program.
-
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
By: TechTarget ComputerWeekly.com
Type: eGuide
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.