You've requested...

Share this with your colleagues:

Intel® IoT Gateway and Google Cloud Platform* Hands-On-Lab

If a new window did not open, click here to view this asset.

Download this next:

Exploring AI in RPA: Guide to AI & intelligent automation

In this video, Blue Prisms Head of AI, Eric Tyree, talks RPA 101 and how intelligent automation built on AI can result in an enterprise digital workforce built smart and at scale.

Tune in now to learn more about:

  • The value of a digital workforce at scale
  • Strategic uses of automation across industries
  • Operational models that accelerate automation

These are also closely related to: "Intel® IoT Gateway and Google Cloud Platform* Hands-On-Lab"

  • How to plan virtual events in 2021

    While we’ve all had to come to terms with the recent cancellations and postponements of in-person events, the current climate has opened up a wealth of digital alternatives. More than ever before, today’s show stopping events are relevant and engaging digital experiences, planned and executed to perfection. Have you been tasked with launching a virtual event, but don’t know where to start?

    Join us for Flip the Switch: Virtual events 101 and let the BrightTALK team guide you step-by-step through creating and launching your virtual event.

  • Infrastructure monitoring 101

    Customer experience — often the front end of a mobile, web or business application — is one of the most important metrics for success. It relies on layers of interconnected technologies that work together to deliver information, transactions and interactions to an end user. And users are hungry for more.

    Our apps and services are expected to work quickly and seamlessly on any number of devices, from different kinds of networks and in different locations around the globe. Monitoring the infrastructure that supports those experiences — layers of interconnected technologies that become more complex every year — is key to any organization’s success.

    Download Infrastructure Monitoring 101 to learn more.

     

Find more content like what you just read:

  • IT security: Know your assets

    As companies expand and move to the cloud, they’re losing track of what they own. But be certain: cyberattackers aren’t. Read this MIT Review white paper to explore statistics behind asset vulnerability and why IT employees need professional soft skills to garner support on what’s required to protect an organization’s attack surface.

    Download

  • 8 cloud certifications that can boost your career

    This e-guide walks you through security best practices in the age of cloud. Also inside, put your security knowledge to the test with two cloud security quizzes from our experts.

    Download

  • For Dummies: How to manage digital risk

    In this e-book, you’ll learn everything you need to know about digital risk management 101. Inside, find out how you can understand the different types of risks, establish policies, controls, and monitoring best practices, and apply 5 tips for secure digital transformation success.

    Download

  • Container security 101

    Container environments bring a range of cybersecurity issues involving images, containers, hosts, runtimes, registries, and orchestration platforms, which all need to be secured. Not sure where to begin? Download Container Security 101: Understanding the Basics of Securing Containers for everything you need to know.

    Download

  • Security without compromise

    Miercom, an independent network and security testing organization, put Palo Alto Networks’ PA-400 Series Next-Generation Firewall through rigorous testing and found that it maintains predictable throughput with services on, offers improved performance and can lower TCO. Read the report to find out what was tested and how.

    Download

  • Kubernetes Cost Optimization

    Access this white paper to learn how organizations can take steps towards Kubernetes cost optimization.

    Download

  • Backup still fundamental but the cloud changes things

    In this e-guide we round up the key ways backup has changed since tape was king and look at developments such as backup appliances, the use of the cloud as a backup target and even the need for backups to protect your workloads in the cloud.

    Download

  • Containers and storage 101: The fundamentals of container storage

    In this e-guide we look at the basics of Docker storage and backup, key containers capabilities in storage vendors' offers and how containers can be incorporated into the private cloud environment.

    Download

  • The vulnerability of backup in a predominantly remote + cloud world

    Backup is fundamental to IT, but things have changed a lot recently. The pandemic has had a key impact in this. In this e-guide we look at the effects of the pandemic on backup, including the increased prevalence of remote working and use of the cloud.

    Download

  • Consumerization 101: Defining & Enforcing a Successful BYOD Policy

    This E-Guide from SearchConsumerization.com explores the top concerns of consumerization and BYOD in and discusses how to create a successful BYOD policy that will help mitigate the risks. In addition, get the answers to today's top consumerization questions and learn how cloud storage can be a life-saver in the event of device loss/theft.

    Download

  • Student Cybersecurity 101

    Today’s schools face more security threats than ever before. Sensitive information is at stake, and school districts search for the best ways to protect their students. Through adoption of cloud technologies from Cisco, you can get your security back on track and shift focus back to education. Dive into this e-book to take a closer look.

    Download

  • SAN block access storage in the age of cloud and hyper-converged

    In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.

    Download

  • SAN block access storage in the age of cloud and hyper-converged

    In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.

    Download

  • Endpoint security 101

    Read this e-guide to fully understand the importance of endpoint security, how it works and 6 crucial components to look for in an endpoint security platform.

    Download

  • Mix and match:Overcoming cloud integration challenges

    This 33-page EGuide seeks to shine a light on all various forms of cloud integration challenges, alongside some of the approaches enterprises have taken to addressing them.

    Download

  • Mix and match:Overcoming cloud integration challenges

    This 33-page EGuide seeks to shine a light on all various forms of cloud integration challenges, alongside some of the approaches enterprises have taken to addressing them.

    Download

  • A Computer Weekly E-guide to NAS

    In the guide we look at the fundamentals of NAS and the use cases it best suits, the range of file access storage products available including in the cloud and in hybrid operation between cloud and datacentre. We also examine the question of NAS backup, looking at the challenges that have accompanied it and the solutions available.

    Download

  • A Computer Weekly E-guide to NAS

    In the guide we look at the fundamentals of NAS and the use cases it best suits, the range of file access storage products available including in the cloud and in hybrid operation between cloud and datacentre. We also examine the question of NAS backup, looking at the challenges that have accompanied it and the solutions available.

    Download

  • Essential Guide: Securing hybrid IT infrastructure

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

    Download

  • Jargon buster guide to hybrid cloud storage

    In this Jargon Buster guide we bring you definitions for the key concepts in hybrid cloud storage plus in-depth articles on hybrid cloud file and object storage, how to use the cloud as a storage tier and the key decision points when it comes to private cloud vs hybrid cloud.

    Download

  • Backup fundamentals in the age of cloud

    In this e-guide we look at backup fundamentals like choosing incremental or differential backup as well as using snapshots to replace traditional backup. We also provide an overview of strategic considerations for backup in the age of the cloud as well as surveys of the key backup products for SMEs and enterprise deployment.

    Download

  • Backup fundamentals in the age of cloud

    In this e-guide we look at backup fundamentals like choosing incremental or differential backup as well as using snapshots to replace traditional backup. We also provide an overview of strategic considerations for backup in the age of the cloud as well as surveys of the key backup products for SMEs and enterprise deployment.

    Download

  • CRM Analytics 101: Harnessing Customer Data for Smarter Business Decisions

    CRM analytics involves drilling into customer data to make smarter business decisions and to offer customers more personalized service. In this expert e-guide, uncover an overview of analytics and what an organization can gain from it, steps for making the business case, the solution landscape, tips for choosing the right platform, and more.

    Download

  • Data Protection 101: Essential Steps for Holistic Information Security

    Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This e-guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.

    Download

  • Container technologies and trends: What enterprises need to know

    In this e-guide, we take a look at how and why enterprises are tapping into containers to bolster the business agility of their IT infrastructure and application estates, and some of the latest thinking about how best to utilise container technologies.

    Download

  • Container technologies and trends: What enterprises need to know

    In this e-guide, we take a look at how and why enterprises are tapping into containers to bolster the business agility of their IT infrastructure and application estates, and some of the latest thinking about how best to utilise container technologies.

    Download

  • Object storage: A great fit for large, unstructured data sets

    Object storage is a rising star. In this e-guide we walk you through the key differences between object storage and the currently more mainstream approaches - file and block access. In doing so you'll clearly see the benefits and drawbacks of the object approach, which is to organise data in a flat structure with unique identifiers.

    Download

  • Disaster recovery has never been so easy or important

    Disaster recovery has never been more important because at the same time that digital transformation has made most modern enterprises entirely dependent on their IT systems to function, cyber attackers have stepped up their capabilities to go after sensitive data wherever it is found, with most IT leaders reporting major systems outages.

    Download

  • NAS meets cloud and unstructured data challenges

    NAS file access storage has progressed to meet the challenges of the cloud era. This e-guide provides key insights into NAS as we know it in the era of cloud and big, unstructured data sets.

    Download

  • NAS meets cloud and unstructured data challenges

    NAS file access storage has progressed to meet the challenges of the cloud era. This e-guide provides key insights into NAS as we know it in the era of cloud and big, unstructured data sets.

    Download

  • Networking monitoring 101: Tips and techniques

    Saying "let's monitor our network" presumes that you know what you should be looking for, how to find it, and how to get it without affecting the system you are monitoring—but that's a lot easier said than done. Download this white paper to learn about the underpinnings of monitoring techniques, theory and philosophy.

    Download

  • NVMe flash storage 101

    Flash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it.

    Download

  • E-Guide: Human Capital Management 101: Best Practices, Tips and Definitions

    Human capital management (HCM) software can be incredibly useful if leveraged correctly, especially if analytics are included.  Read this expert e-guide to learn best practices for improving your HR operations with HCM software.

    Download

  • E-Guide: Human Capital Management 101: Best Practices, Tips and Definitions

    Human capital management (HCM) software can be incredibly useful if leveraged correctly, especially if analytics are included.  Read this expert e-guide to learn best practices for improving your HR operations with HCM software.

    Download

  • BYOD 101: Combat the Phenomenon’s Top Challenges

    In this e-guide from SearchConsumerization.com, uncover how to implement and enforce policies to improve your BYOD initiatives. Get the answers to your most pressing BYOD questions and also learn how desktop virtualization and application streamlining can help combat BYOD security challenges.

    Download

  • Storage Capacity 101 to Post-Grad in a Flash

    In this report from Quocirca, analyst Clive Longbottom explains why you don't always get what you think you're getting with flash storage.

    Download

  • NVMe promises blisteringly fast flash performance

    In this guide we look at the architectural issues blocking agreement on NVMe, the fundamentals that underlie NVMe and its blistering performance, the key NVMe product deployments available, and ask what will become of the storage features associated with the storage controller.

    Download

  • Container security: Understanding the basics

    Developers have widely embraced containers because they are designed to make building and deploying so-called cloud native applications simpler, but they also carry a range of cybersecurity issues. Download this e-book to learn how you can ensure security for these essential applications.

    Download

  • SOAR: Rise of the independents

    Recently, security operations teams have been met with the need to work collaboratively and better protect their organizations from sophisticated attacks. Read this Aite-Novarica report to discover the efficacy of Cyware’s SOAR platform for enhancing security analyst productivity and delivering increased visibility.

    Download

  • Object Storage 101

    Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.

    Download

  • IT Project: Storage Architecture ANZ

    When it comes to storage, there are usually two main factors to consider – cost and performance. However, every organisation has its own unique set of requirements and this will inevitably shape their storage strategy. Inside this guide, we look at some examples of the strategies organisations are adopting to effectively store and manage data.

    Download

  • IT Project: Storage Architecture ASEAN

    When it comes to storage, is cost the critical factor for CIOs in ASEAN? This guide explores the factors that are influencing the adoption of storage technologies in ASEAN and the trends that you can expect to see more of in the next 2-3 years.

    Download

  • Computer Weekly – 26 May 2020: Can Lady Gaga and Madonna get people to take IT security seriously?

    In this week's Computer Weekly, after hackers threatened to release data from a US law firm's celebrity clients, will people finally take cyber security seriously? Designing software for older users makes systems better for all – we examine how. And the IT chief at TSB explains how the bank recovered from its 2018 IT disaster. Read the issue now.

    Download

  • Computer Weekly - 31 March 2020: Can the internet take the strain?

    In this week's Computer Weekly, as millions of people work from home, we examine the measures in place to make sure the internet stays up and running. Our latest buyer's guide looks at the best practice in application modernisation. And we find out how IT leaders are tackling the skills shortage to recruit the best tech talent. Read the issue now.

    Download

  • Computer Weekly – 12 May 2020: Will the NHS's Covid-19 contact-tracing app work?

    In this week's Computer Weekly, we get the expert reaction to find out if the NHS contact-tracing app will work. Staying close to clients is crucial through lockdown – we look at the importance of customer experience management. And one CIO explains how he implemented a digital transformation plan in two weeks. Read the issue now.

    Download

  • Computer Weekly – 14 February 2017: Under surveillance – what the Investigatory Powers Act means for business

    In this week's Computer Weekly, the UK government has passed the Investigatory Powers Act, labelled a "snoopers' charter" that expands the scope of state surveillance – but what does it mean for businesses? We find out what digital transformation means in the fire and rescue service. And we examine the public cloud and storage. Read the issue now.

    Download

  • Avon calling: what happens when lockdown eliminates your business model?

    In this week's Computer Weekly, global beauty brand Avon explains how it coped with a lockdown dilemma – a door-to-door sales model when its reps couldn't leave home. Our buyer's guide examines the use of artificial intelligence in IT security. And we analyse the government's decision to strip Huawei from the UK's 5G network. Read the issue now.

    Download