You've requested...

Intel® IoT Gateway and Google Cloud Platform* Hands-On-Lab

If a new window did not open, click here to view this asset.

Download this next:

Automation for Network Engineers: Why and How

In this video, Nexum engineers attending the Red Hat Summit share insights about a workshop that they conducted for network engineers: Automation 101.

To discover the value that leveraging automation capabilities can deliver for your organization’s network engineers, and to learn how Nexum can help you along the journey, watch now.

These are also closely related to: "Intel® IoT Gateway and Google Cloud Platform* Hands-On-Lab"

  • 101 lesson on MXDR (Managed Extended Detection & Response)

    As cyberthreats grow more sophisticated, how can you level up your security defenses?

    Consider leveraging Managed Extended Detection and Response (MXDR), this blog argues.

    So, what should you know about the security service? In this 101 lesson on MXDR, discover:

    • 5 core capabilities of MXDR
    • Which threats MXDR can identify
    • Types of advanced threat analytics that an MXDR service should provide
    • And much more

  • Ransomware readiness assessments: 101 guide

    In the face of increasingly sophisticated ransomware attacks, many businesses are working to bolster their defenses.

    One step your organization can take toward accomplishing that goal is to leverage a ransomware readiness assessment.

    So, what does a ransomware readiness assessment evaluate? 6 key components, including security controls and employee awareness.

    To discover the rest, and to unlock a 101 guide to ransomware readiness assessments, explore this blog post.

Find more content like what you just read:

  • 4 best practices for APM (application performance monitoring)

    For a 101 guide to application performance monitoring (APM), take a look through this blog by Honeycomb.

    Download

  • 11-page guide: Selecting an MDR provider

    When evaluating the managed detection and response (MDR) landscape, what should you look for in a provider? Along with breaking down forward-thinking capabilities and why they matter, this 11-page buyer’s guide presents MicroBilt’s MDR success story. Keep reading to unlock these insights and more.

    Download

  • How to plan virtual events

    Have you been tasked with launching a virtual event, but don’t know where to start? Join us for Flip the Switch: Virtual events 101 and let the BrightTALK team guide you step-by-step through creating and launching your virtual event.

    Download

  • The key role of IAST for security testing

    In the age of observability, Interactive Application Security Testing (IAST) has emerged as an essential security testing strategy. This resource examines how IAST helps observability of multiplying, complex apps, as well as the crucial role it plays in an effective security strategy.

    Download

  • Cloud Security 101: Best Practices & Self-Assessment

    This e-guide walks you through security best practices in the age of cloud. Also inside, put your security knowledge to the test with two cloud security quizzes from our experts.

    Download

  • Backup still fundamental but the cloud changes things

    In this e-guide we round up the key ways backup has changed since tape was king and look at developments such as backup appliances, the use of the cloud as a backup target and even the need for backups to protect your workloads in the cloud.

    Download

  • Containers and storage 101: The fundamentals of container storage

    In this e-guide we look at the basics of Docker storage and backup, key containers capabilities in storage vendors' offers and how containers can be incorporated into the private cloud environment.

    Download

  • The vulnerability of backup in a predominantly remote + cloud world

    Backup is fundamental to IT, but things have changed a lot recently. The pandemic has had a key impact in this. In this e-guide we look at the effects of the pandemic on backup, including the increased prevalence of remote working and use of the cloud.

    Download

  • Consumerization 101: Defining & Enforcing a Successful BYOD Policy

    This E-Guide from SearchConsumerization.com explores the top concerns of consumerization and BYOD in and discusses how to create a successful BYOD policy that will help mitigate the risks. In addition, get the answers to today's top consumerization questions and learn how cloud storage can be a life-saver in the event of device loss/theft.

    Download

  • Royal Holloway: Information security of the 2016 Philippine automated elections

    We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.

    Download

  • SAN block access storage in the age of cloud and hyper-converged

    In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.

    Download

  • SAN block access storage in the age of cloud and hyper-converged

    In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.

    Download

  • Endpoint security 101

    Read this e-guide to fully understand the importance of endpoint security, how it works and 6 crucial components to look for in an endpoint security platform.

    Download

  • Mix and match:Overcoming cloud integration challenges

    This 33-page EGuide seeks to shine a light on all various forms of cloud integration challenges, alongside some of the approaches enterprises have taken to addressing them.

    Download

  • Mix and match: Overcoming cloud integration challenges

    This 33-page EGuide seeks to shine a light on all various forms of cloud integration challenges, alongside some of the approaches enterprises have taken to addressing them.

    Download

  • A Computer Weekly E-guide to NAS

    In the guide we look at the fundamentals of NAS and the use cases it best suits, the range of file access storage products available including in the cloud and in hybrid operation between cloud and datacentre. We also examine the question of NAS backup, looking at the challenges that have accompanied it and the solutions available.

    Download

  • Essential Guide: Securing hybrid IT infrastructure

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

    Download

  • Jargon buster guide to hybrid cloud storage

    In this Jargon Buster guide we bring you definitions for the key concepts in hybrid cloud storage plus in-depth articles on hybrid cloud file and object storage, how to use the cloud as a storage tier and the key decision points when it comes to private cloud vs hybrid cloud.

    Download

  • Backup fundamentals in the age of cloud

    In this e-guide we look at backup fundamentals like choosing incremental or differential backup as well as using snapshots to replace traditional backup. We also provide an overview of strategic considerations for backup in the age of the cloud as well as surveys of the key backup products for SMEs and enterprise deployment.

    Download

  • CRM Analytics 101: Harnessing Customer Data for Smarter Business Decisions

    CRM analytics involves drilling into customer data to make smarter business decisions and to offer customers more personalized service. In this expert e-guide, uncover an overview of analytics and what an organization can gain from it, steps for making the business case, the solution landscape, tips for choosing the right platform, and more.

    Download

  • Data Protection 101: Essential Steps for Holistic Information Security

    Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This e-guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.

    Download

  • Container technologies and trends: What enterprises need to know

    In this e-guide, we take a look at how and why enterprises are tapping into containers to bolster the business agility of their IT infrastructure and application estates, and some of the latest thinking about how best to utilise container technologies.

    Download

  • Object storage: A great fit for large, unstructured data sets

    Object storage is a rising star. In this e-guide we walk you through the key differences between object storage and the currently more mainstream approaches - file and block access. In doing so you'll clearly see the benefits and drawbacks of the object approach, which is to organise data in a flat structure with unique identifiers.

    Download

  • Disaster recovery has never been so easy or important

    Disaster recovery has never been more important because at the same time that digital transformation has made most modern enterprises entirely dependent on their IT systems to function, cyber attackers have stepped up their capabilities to go after sensitive data wherever it is found, with most IT leaders reporting major systems outages.

    Download

  • NAS meets cloud and unstructured data challenges

    NAS file access storage has progressed to meet the challenges of the cloud era. This e-guide provides key insights into NAS as we know it in the era of cloud and big, unstructured data sets.

    Download

  • NVMe flash storage 101

    Flash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it.

    Download

  • E-Guide: Human Capital Management 101: Best Practices, Tips and Definitions

    Human capital management (HCM) software can be incredibly useful if leveraged correctly, especially if analytics are included.  Read this expert e-guide to learn best practices for improving your HR operations with HCM software.

    Download

  • E-Guide: Human Capital Management 101: Best Practices, Tips and Definitions

    Human capital management (HCM) software can be incredibly useful if leveraged correctly, especially if analytics are included.  Read this expert e-guide to learn best practices for improving your HR operations with HCM software.

    Download

  • BYOD 101: Combat the Phenomenon’s Top Challenges

    In this e-guide from SearchConsumerization.com, uncover how to implement and enforce policies to improve your BYOD initiatives. Get the answers to your most pressing BYOD questions and also learn how desktop virtualization and application streamlining can help combat BYOD security challenges.

    Download

  • Storage Capacity 101 to Post-Grad in a Flash

    In this report from Quocirca, analyst Clive Longbottom explains why you don't always get what you think you're getting with flash storage.

    Download

  • Container Security 101

    Developers have widely embraced containers because they are designed to make building and deploying so-called cloud native applications simpler, but they also carry a range of cybersecurity issues. Download this e-book to learn how you can ensure security for these essential applications.

    Download

  • NVMe promises blisteringly fast flash performance

    In this guide we look at the architectural issues blocking agreement on NVMe, the fundamentals that underlie NVMe and its blistering performance, the key NVMe product deployments available, and ask what will become of the storage features associated with the storage controller.

    Download

  • Object Storage 101

    Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.

    Download

  • Computer Weekly – 26 May 2020: Can Lady Gaga and Madonna get people to take IT security seriously?

    In this week's Computer Weekly, after hackers threatened to release data from a US law firm's celebrity clients, will people finally take cyber security seriously? Designing software for older users makes systems better for all – we examine how. And the IT chief at TSB explains how the bank recovered from its 2018 IT disaster. Read the issue now.

    Download

  • Computer Weekly - 31 March 2020: Can the internet take the strain?

    In this week's Computer Weekly, as millions of people work from home, we examine the measures in place to make sure the internet stays up and running. Our latest buyer's guide looks at the best practice in application modernisation. And we find out how IT leaders are tackling the skills shortage to recruit the best tech talent. Read the issue now.

    Download

  • Computer Weekly – 12 May 2020: Will the NHS's Covid-19 contact-tracing app work?

    In this week's Computer Weekly, we get the expert reaction to find out if the NHS contact-tracing app will work. Staying close to clients is crucial through lockdown – we look at the importance of customer experience management. And one CIO explains how he implemented a digital transformation plan in two weeks. Read the issue now.

    Download

  • Computer Weekly – 14 February 2017: Under surveillance – what the Investigatory Powers Act means for business

    In this week's Computer Weekly, the UK government has passed the Investigatory Powers Act, labelled a "snoopers' charter" that expands the scope of state surveillance – but what does it mean for businesses? We find out what digital transformation means in the fire and rescue service. And we examine the public cloud and storage. Read the issue now.

    Download

  • Avon calling: what happens when lockdown eliminates your business model?

    In this week's Computer Weekly, global beauty brand Avon explains how it coped with a lockdown dilemma – a door-to-door sales model when its reps couldn't leave home. Our buyer's guide examines the use of artificial intelligence in IT security. And we analyse the government's decision to strip Huawei from the UK's 5G network. Read the issue now.

    Download

  • Avon calling: what happens when lockdown eliminates your business model?

    In this week's Computer Weekly, global beauty brand Avon explains how it coped with a lockdown dilemma – a door-to-door sales model when its reps couldn't leave home. Our buyer's guide examines the use of artificial intelligence in IT security. And we analyse the government's decision to strip Huawei from the UK's 5G network. Read the issue now.

    Download

  • How modern endpoint security improves visibility and reduces risk

    This white paper aims to help security and IT professionals better understand the costs and risks of trying to make legacy endpoint security solutions effective in today’s threat environment. Download now to see why only a cloud-native approach to endpoint protection can provide the assets your security team needs to be successful.

    Download

  • The Ultimate Guide to Collaboration for Small and Mid-Market Businesses

    With it being predicted that 36.2 million Americans will be working remotely by 2025, it has become critical for organizations to ensure that their collaboration solutions meet modern standards. But how can this best be done? Browse this e-book to learn more.

    Download

  • Focus: Object storage

    Object storage does away with the tree-like hierarchies of file systems used by traditional storage NAS and SAN systems.

    Download

  • AWS vs Azure vs Google: 5 key benefits each for cloud file storage

    In this e-guide: The big three offer cloud file storage that can ease hybrid cloud operations, with consistency between cloud and on-premise as well as greater enterprise application compatibility.

    Download

  • Your expert guide to data protection strategy: backup, replication, snapshots and virtualisation

    We walk you from the basics of backup methods to the pros and cons of different ways of protecting data and key issues in virtual machine backup.

    Download

  • Understanding Consumer Device Management and BYOD

    This E-Guide from SearchConsumerization.com provides you with the BYOD resources necessary to ensure a successful implementation, creation, and adoption. View now to learn more!

    Download

  • 2017 Nordics Salary Survey Infographic

    Most Nordic IT professionals are not looking for a new job, preferring progression with their current employer, according to a Computer Weekly survey.

    Download

  • 2021 ANZ Salary Survey - Salary Infographic

    We take a look at our 2021 Salary Survey results from over 200 respondents who work in the ANZ IT sector. This useful infographic will give you a snapshot of which job functions get paid what, what IT professionals are thinking in terms of career and their salary expectations for the next 12 months.

    Download