You've requested...

Download this next:

Computer Weekly – 27 March 2018: The desktop is changing

In this week’s Computer Weekly, corporate PCs haven’t changed much in 20 years – as use of Chrome OS grows, we ask if IT leaders are ready for a different approach. Theresa May said Brexit will mean the UK leaving the EU digital single market – does this mean a return to roaming charges? And we look at the latest developments in the leading versions of Linux. Read the issue now.

These are also closely related to: "How Google is doing hybrid work"

  • The changing mobile platform landscape

    So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.

  • Computer Weekly – 22 May 2018: GDPR is here – are you ready?

    In this week’s Computer Weekly, the EU’s new data protection regulation, GDPR, comes into force this week – we ask if companies are ready and look at what happens if you’re not yet compliant. Our latest buyer’s guide examines digital transformation and the role of the CIO. And we find out how technology is changing the traditional sport of cricket. 

    Also featured: 

    • How Belgian public health consulting firm AEDES has worked with a local partner in the Democratic Republic of Congo to deliver a health information management system based on Couchbase.
    • With browser-based applications growing in popularity, we consider how CIOs should approach the changing face of desktop IT.
    • These days, 5G grabs all the hype and headlines, but 4G still has a lot more to give. It’s a good thing too, as operators have no choice but to sweat their assets.

Find more content like what you just read:

  • A Computer Weekly buyer's guide to the future of collaboration

    Businesses are using collaborative software to operate in revolutionary new ways. In this 13-page buyer's guide, Computer Weekly looks at its potential negatives, the improved agility it provides and assesses Chromebooks as collaboration clients

    Download

  • Windows 10: How the client operating system is evolving

    A discussion about strategies for Windows 10 really boils down to the organisation's desktop IT strategy. Windows PCs account for the bulk of the personal computing market and the Windows client remains the dominant target platform for developers of client-side applications. In this e-guide, we look at the evolution of desktop IT.

    Download

  • Computer Weekly – 16 October 2018: Drilling into AI at Shell

    In this week's Computer Weekly, we find out how oil giant Shell is using AI and machine learning to boost workforce productivity. We analyse the attempted Russian cyber attack revealed by the Dutch government. And we look at how blockchain is being used in the food and drink industry to improve supply chain management. Read the issue now.

    Download

  • Containers in the enterprise: Use cases and latest developments

    In this e-guide we delve into the world of containers. We discover why many enterprises appear to be intent on using the technology to support the remodelling of their legacy applications in microservices. Also, we take a look at why interest in containers has risen thanks to enterprises moving from hybrid and multi-cloud environments.

    Download

  • Computer Weekly – 21 August 2018: Delivering the potential of the internet of things

    In this week's Computer Weekly, we hear from early adopters of internet of things technologies about how to deliver on the potential of IoT. We examine strategies for combining hyper-converged infrastructure and cloud storage to best effect. And we find out how the UK government intends to use data to improve Britain's railways. Read the issue now.

    Download

  • Take the classroom technology experience to the next level

    When schools invest in technology, they need hardware that is compatible, reliable, and easy to use. Whether it is audio, video, or peripherals, this equipment is necessary. Having technology that works in any ecosystem allows students to thrive and learn. Read on to learn more about how to equip students for success in the classroom.

    Download

  • Digital signage playbook for manufacturing leaders

    Do you want to improve employee engagement, performance, and operational efficiency in your manufacturing organization? It all starts with better communication! Browse this guide to learn more.

    Download

  • A Computer Weekly buyer's guide to going beyond desktop Computing

    A digital workplace opens up a range of new possibilities for businesses, but it needs to be implemented in the right way. In this 13-page buyer's guide, Computer Weekly looks at how digital workplaces demand increasing functionality, how to make sense of desktop as a service, and the value of unified endpoint management.

    Download

  • Data management for the distributed workforce

    The challenges of data management, security, and access are nowhere felt more strongly than edge environments. This data sheet explores how Panzura Edge brings the resilience, security and access control of CloudFS to the distributed workforce across a number of use cases. Download now to learn more.

    Download

  • Managing Android devices in the enterprise

    This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).

    Download

  • Browser isolation: Your key to combatting cybercrime

    Despite the ease and sophistication that browsers have brought to internet use, they also have become the target choice for cybercriminals looking to hack into your organization and personal data. But why exactly is this? Dig into this white paper to learn more.

    Download

  • Innovation Awards APAC 2023 - Transportation: Transdev Sydney Ferries

    With public safety a top priority, Transdev Sydney Ferries realised it had to move to a 5G network infrastructure that could better provide the capacity and speed it needed. The decision has enabled the transport operator to shorten the time needed to analyse hours of video footage and resolve at least 70% of feedback within 2 business days.

    Download

  • CW Nordics - February-April 2022: Swedish drone app gets life-saving equipment to heart attack victims

    Thanks to an app developed in Sweden, drones can get life-saving equipment to heart-attack victims before emergency services can arrive on the scene, potentially increasing patient survival rates. Also in this issue, read about a Swedish bank's time-saving robots.

    Download

  • Improved security and user experience with the Enterprise Browser

    Web browsers are designed to run third-party code directly on the endpoint. Many organizations use remote browser isolation (RBI) solutions to provide gateway infrastructure. Island saw the promise in these solutions, and decided to take them a step further, introducing them natively into their Enterprise Browser solution. Read on to learn more.

    Download

  • Computer Weekly - 8 September 2020: NHS whistleblowers at risk due to poor IT policies

    In this week's Computer Weekly, our investigation into NHS practices shows how poor IT policies are putting whistleblowers at risk. Our buyer's guide examines the networking implications of the surge in remote working. And we assess how well the public cloud giants responded to the demands of the coronavirus pandemic Read the issue now.

    Download

  • Top 10 IT security stories of 2018

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

    Download

  • Top 10 end-user computing stories of 2019

    IT has been looking at how desktop computing can enable employees to become more productive by using new forms of collaboration and enterprise social media platforms. Here are Computer Weekly's top 10 end-user computing stories of 2019.

    Download

  • The Ultimate Guide to Collaboration for Small and Mid-Market Businesses

    With it being predicted that 36.2 million Americans will be working remotely by 2025, it has become critical for organizations to ensure that their collaboration solutions meet modern standards. But how can this best be done? Browse this e-book to learn more.

    Download

  • Sandnet++ – A framework for analysing and visualising network traffic from malware

    This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware

    Download

  • How it Can Save Time and Enable Better Hybrid Work

    When the pandemic hit, most companies lacked a remote working strategy and many people had minimal remote experience. However, even with hybrid work now the norm, many organizations are still struggling to enable a consistently equitable meeting experience for remote and in-office workers alike. Access the white paper to learn more.

    Download

  • Security leader’s guide to AI-based scams

    The capabilities of large language models (LLMs) and generative AI are rapidly evolving. This white paper describes how hackers are utilizing generative AI to fuel cyberattacks, scams, and other social engineering related threats. Read on to learn more.

    Download

  • Computer Weekly – 16 January 2018: How to fix the Meltdown and Spectre chip flaws

    In this week's Computer Weekly, as CIOs come to terms with the Meltdown and Spectre processor flaws that make every computer a security risk, we examine how to protect your IT estate. We find out how Alexa-style smart speakers can help with CRM strategies. And we look at how the public sector is implementing DevOps. Read the issue now.

    Download

  • The secret to better communication for educators

    Today’s education professionals need efficient ways to communicate and interact with parents, administrators, students, and coworkers. However, due to school budget restrictions and other challenges, many educators find themselves unsure of how to proceed. Dig into this white paper to learn more.

    Download

  • Logi Bolt wireless technology at a glance

    Download this e-book to gain access to best practices and recommendations for optimizing the performance of Logi Bolt wireless products in your workplace environment.

    Download

  • 4-step plan for denial prevention

    What do you do when staff don’t have the time, money, or resources to work denials as thoroughly as they’d like? The technology and tactics to prevent denials is here and you can unlock a proven approach to denial prevention. Get a step-by-step denial prevention plan in this e-book.

    Download

  • Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium

    In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.

    Download

  • The difficulties of defending against web tracking

    This article in our Royal Holloway information security series introduces you to web tracking, provides an overview of how organisations track users and discusses a few of the difficulties you may face when trying to defend against tracking.

    Download

  • Panda Adaptive Defense 360 Technologies

    In an era of sophisticated ransomware and increasingly frequent cyberattacks, MSPs need to make sure they have comprehensive security capabilities. Access this white paper to learn how Panda Adaptive Defense 360 offers a full protection stack including endpoint protection technology, zero-trust defense, and contextualized behavior detection.

    Download

  • Royal Holloway: Rowhammer – From DRAM faults to escalating privileges

    Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them

    Download

  • Computer Weekly – 27 June 2023: The politics of AI

    In this week's Computer Weekly, Rishi Sunak and Keir Starmer both spoke at London Tech Week to present their visions of an AI future for the UK – we compare their plans. We talk to the CTO of chip giant AMD about making tech more energy efficient. And we look at optimising networks for hybrid working. Read the issue now.

    Download

  • Quocirca: Selecting a cloud printing platform

    As IT teams are faced with managing printing across a hybrid workplace, cloud printing platforms offer a way of tracking, monitoring and securing print in the office and at home. With untrusted devices, such as home printers, posing a threat to IT security, cloud print platforms that support zero-trust environments should be deployed.

    Download

  • A guide to developing cloud applications using PaaS

    In this e-guide we look at the management and development tools that are required to build, deploy and operate cloud-native applications at scale.

    Download

  • CW EMEA July 2023: Can we trust AI?

    Artificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public.

    Download

  • Computer Weekly – 29 January 2019: A vintage digital transformation for Majestic Wines

    In this week's Computer Weekly, we examine the digital transformation of retailer Majestic Wines and find out how buying rival Naked Wines led to a cloud overhaul of the firm's IT. We look at the challenges for IT managers as they prepare for the end of Windows 7 support. And our buyer's guide discusses deep learning technology. Read the issue now.

    Download

  • Adobe Acrobat with Document Cloud Services Security Overview

    This white paper describes the defense-in-depth approach and security procedures implemented by Adobe to bolster the security of Adobe Acrobat with Document Cloud services and associated data.

    Download

  • A Computer Weekly buyer's guide to edge datacentres

    Edge datacentres seem set for a post-pandemic resurgence. In this 17-page buyer's guide, Computer Weekly looks at what makes them such an appealing option, the role infrastructure as code has to play and what's driving company adoption.

    Download

  • A Computer Weekly buyer's guide to perimeterless network security

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

    Download

  • Key ESG findings from 50 direct interviews of supply chain executives

    According to a recent environmental social and governance (ESG) survey, there is little agreement among organizations as to the scope and vision of their ESG programs. Download this e-book to unlock key findings on the state of ESG and see how you can optimize your sustainability initiatives.

    Download

  • Today’s top companies for global personal communications

    Each year, Frost & Sullivan rigorously assesses multiple nominees for their best-in-class, New Product Innovation Award. This year, Logitech was given the coveted award for their Logi Dock collaboration dock. Access this report to learn why.

    Download

  • A guide to platform agnostic application delivery

    There is no single answer to the question of how to run applications independent of the underlying hardware. In this e-guide, we explore options for application virtualisation.

    Download

  • Cloud migration vs. staying on-prem: How to make the choice

    Today, many organizations have one question on their minds: do they migrate their operations to the cloud or should they stay on-prem? The answer may be different for everyone, but understanding what’s best for your needs may be tricky. Browse this white paper to learn more.

    Download

  • CVE alerts: Protect your security posture

    Common Vulnerabilities and Exposures (CVE) remediation isn’t deprioritized because security teams don’t understand the value, rather it happens because network complexity is growing exponentially. Access this white paper to learn how the Forward Enterprise platform is designed to enhance your security posture.

    Download

  • 6 benefits of Red Hat Enterprise Linux

    Along with describing how Red Hat’s platform works, this e-book—The Power of Red Hat Enterprise Linux—outlines what a Red Hat Enterprise Linux subscription provides. Read on to discover 6 benefits of leveraging the platform, including visibility into new technologies, enhanced security and more.

    Download

  • Computer Weekly – 31 July 2018: Learning digital government lessons from Estonia

    In this week's Computer Weekly, we look at one of the world's most digitally advanced nations, Estonia, and ask what the UK government can learn. We talk to Airbus about how aircraft manufacturers are prioritising cyber security. And we examine how AI and robots will augment – not replace – human productivity. Read the issue now.

    Download

  • Enterprise mobility management software offerings and use cases

    Enterprise mobility management software allows IT to deploy security policies and provide access to internal resources by integrating with APIs in the mobile OSes. This e-guide shows enterprise mobility management software offerings and use cases.

    Download

  • Endpoint security 101

    Read this e-guide to fully understand the importance of endpoint security, how it works and 6 crucial components to look for in an endpoint security platform.

    Download

  • VMworld Europe 2016: What to expect

    VMworld Europe 2016 hits Barcelona in October, with VMware expected to announce new and refreshed products and services in support of its end-user computing and cloud strategy. In this e-guide, you'll find case studies featuring last year's winners, along with articles covering the technologies VMware looks set to champion at this year's event.

    Download