Cruise Industry Reports

How do Iconic Business Models such as Airbnb Emerge?
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Brands such as Airbnb disrupt industries and change how consumers think about the market, according to this research from Cass Business School, City University London.
Posted: 16 Mar 2016 | Published: 16 Mar 2016

ComputerWeekly.com

Computer Weekly – 21 January 2020: How to avoid becoming the next Travelex
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the lessons learned from the ransomware attack on Travelex and how other firms can avoid the same fate. As Microsoft ends support for Windows 7, we examine the issues for the many remaining users of the operating system. And healthcare CIOs explain the tech challenges facing the NHS. Read the issue now.
Posted: 08 Feb 2021 | Published: 21 Jan 2020

ComputerWeekly.com

Computer Weekly – 3 July 2018: Future-proofing Gatwick Airport's technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes at London Gatwick Airport and talk to its CIO about a critical network upgrade to support passenger growth. Our latest buyer's guide examines automation and intelligent systems management. And we assess the latest technologies for boosting storage performance. Read the issue now.
Posted: 29 Jun 2018 | Published: 29 Jun 2018

ComputerWeekly.com

Computer Weekly - 9 August 2022: Eurotunnel's digital journey for the realities of post-Covid travel
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the travel industry was devastated by the pandemic, but we find out how Eurotunnel is turning to digital to better engage customers in the post-Covid world. We examine the impact of the economic slowdown on the tech giants. And we explain all you need to know about data gravity. Read the issue now.
Posted: 05 Aug 2022 | Published: 09 Aug 2022

ComputerWeekly.com

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

ComputerWeekly.com

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021

ComputerWeekly.com

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Cruise Industry Leader Carnival Australia Improves IT Productivity and Reduces IT Costs by Optimizing Satellite WAN with Silver Peak
sponsored by Silver Peak
CASE STUDY: This case study demonstrates how Carnival Australia was able to achieve necessary improvements using Silver Peak’s data center class WAN optimization appliances to optimize satellite connections and address the network-induced latency, bandwidth limitations, and packet-loss issues on the WAN.
Posted: 31 Oct 2011 | Published: 31 Oct 2011

Silver Peak

Using Converged and Hyper-Converged Infrastructure to Support VDI
sponsored by SearchVirtualDesktop.com
EBOOK: Learn why hyper-converged infrastructure is a good fit for VDI deployments and find out which of the top vendors in the market might be right for you.
Posted: 24 Jun 2016 | Published: 24 Jun 2016

SearchVirtualDesktop.com

Recap: Splunk.conf 18
sponsored by ComputerWeekly.com
EGUIDE: Download this e-guide for coverage of Splunk.conf 2018, looking into subjects such as security automation, data-driven pre-emptive maintenance and why diversity is so important when developing the technologies of the future.
Posted: 30 Oct 2018 | Published: 30 Oct 2018

ComputerWeekly.com

Royal Holloway: Secure connected and autonomous vehicles - the long road ahead
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Advances in technology have led to  safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

ComputerWeekly.com

Royal Holloway: Driverless vehicle security for military applications
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
Posted: 09 Jul 2020 | Published: 14 Jul 2020

ComputerWeekly.com

Royal Holloway: Investigating the security vulnerabilities and solutions for connected and autonomous vehicle technologies
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.
Posted: 23 Jun 2022 | Published: 23 Jun 2022

ComputerWeekly.com

CW Middle East: UAE faces IT recruitment challenge
sponsored by ComputerWeekly.com
EZINE: With a tolerant professional culture, the UAE is becoming the technological hub of the Middle East, but lacks a strong technological workforce. Access this expert e-zine to see how these Middle Eastern organizations are bringing in new employees, and see what similar tactics your organization could use in your recruitment efforts as well.
Posted: 07 Apr 2017 | Published: 13 Apr 2017

ComputerWeekly.com

Top 10 telecoms stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: To paraphrase the eternally wonderful Sesame Street: this year's telecoms industry has been brought to you by the number "5", and the letter's "G" and "H". Here is Computer Weekly's top 10 list of what was driving the telecoms industry during 2019.
Posted: 03 Jan 2020 | Published: 03 Jan 2020

ComputerWeekly.com

October 2013 Health IT E-Zine
sponsored by SearchHealthIT.com
EZINE: In this issue of Pulse, readers will get the latest pros and cons of signal extension systems like distributed antenna systems and femtocells and best practices for implementing technologies to support 2014's health IT initiatives and big data projects.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

SearchHealthIT.com

Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Cyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
Posted: 05 Aug 2016 | Published: 05 Aug 2016

ComputerWeekly.com

Distributed Cloud and Edge Computing For 100% Uptime
sponsored by Couchbase
WHITE PAPER: With cloud computing growing exponentially, applications that rely on the cloud for data storage and processing are showing signs of strain – especially those that require high availability and sub-second response times. This white paper explains how “edge computing” addresses those issues by keeping data closer to, or on, the devices using it.
Posted: 01 Apr 2021 | Published: 01 Apr 2021

Couchbase

Debunking 10 Gigabit Ethernet Myths
sponsored by Dell, Inc. and Intel®
EGUIDE: 10 Gigabit Ethernet (10GbE) has been around for years, but is still new to many network engineers. Access this E-Guide to read about some of the most common myths surrounding the technology. Also learn the truth about price, requirements, what’s in store for the future, and more.
Posted: 20 Dec 2011 | Published: 20 Dec 2011

Dell, Inc. and Intel®

Computer Weekly – 11 December 2018: Manchester's evolution from rag trade to digital hub
sponsored by ComputerWeekly.com
EZINE: This issue of Computer Weekly explores innovation in the digital era – from the role of software-defined networking in the datacentre, to quantum computing, and much more.
Posted: 07 Dec 2018 | Published: 07 Dec 2018

ComputerWeekly.com

Top 10 Middle East IT stories of 2021
sponsored by ComputerWeekly.com
EGUIDE: The Middle East is about more than oil these days, with advanced technology industries developing across the region. Here are Computer Weekly's top 10 Middle East IT stories of 2021.
Posted: 01 Feb 2022 | Published: 01 Feb 2022

ComputerWeekly.com

Enterprise Security: Multi Factor Authentication Edition
sponsored by Daon
WHITE PAPER: Take a look at this white paper for a close examination of how Daon's IdentityX Platform aims to create digital identities that avoid the patchwork structure of disconnected systems.
Posted: 29 Jun 2022 | Published: 29 Jun 2022

TOPICS:  .NET
Daon

Cyber security in the Middle East
sponsored by ComputerWeekly.com
EGUIDE: As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

ComputerWeekly.com

Optimizing Network Performance to Accelerate the Business
sponsored by SearchSecurity.com
EBOOK: This eBook addresses how IT and business professionals can align network performance with business requirements to accelerate the Web-enabled business and gain significant competitive advantage
Posted: 15 Jul 2011 | Published: 13 Jul 2011

SearchSecurity.com

Forging A Path To Data And Analytics Value: A Credit Union’s Guide
sponsored by TIBCO
EBOOK: Knowing your customers’ behavioral buying patterns is key for any business. The problem that many companies face is what to do with the mountains of data they collect. Read how one credit union bypassed the headaches of manually analyzing data and utilized cutting edge analytics to improve their data analysis productivity by 96% in short time.
Posted: 01 Apr 2022 | Published: 01 Apr 2022

TOPICS:  Data Analytics
TIBCO

Six Signs Your Customer Service Strategy Is Broken
sponsored by Oracle Corporation
EGUIDE: In the "age of the customer" business leaders and decision makers are focusing more than ever on designing customer experiences to attract, engage, and retain finicky consumers. This white paper aims to help CIO's achieve this goal by training them to recognize 6 ineffective customer service strategies.
Posted: 23 Feb 2016 | Published: 16 Feb 2016

Oracle Corporation

E-Guide: Benchmarking Core Switches: Modeling Techniques for Switch Testing
sponsored by NETGEAR Inc.
EGUIDE: Bottlenecks can lurk inside a high-speed 10 GbE core switch and cause its actual performance to clock in below theoretical maximum. The solution is benchmark any of these high-end devices before purchase. This e-guide discusses why using model traffic modeling to benchmark core switches is your best choice and how it can cut major costs.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

NETGEAR Inc.

Computer Weekly – 27 January 2015: Why we need cyber war games
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the UK and US are starting a cyber war – all in the name of testing each other's defences. We look at why the war games are needed. We examine what IT managers can learn from the car industry to improve supplier relationships. And we find out why innovation should be top of the IT agenda in 2015. Read the issue now.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

ComputerWeekly.com

Modern Mobility E-zine – April 2016
sponsored by SearchMobileComputing
EZINE: Unbeknownst to many, Amazon has built a large portfolio of enterprise mobility services. So does that make it the next mobile giant? Discover how Amazon could make waves with its EMM, data synchronization and app development tools. Access now to also learn when your IT should think about outsourcing mobile support tasks.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

SearchMobileComputing

Supporting a Multichannel Contact Center
sponsored by SearchCRM
EGUIDE: Consult this expert e-guide to uncover how you can provide customer support across multiple communication channels. Assisting customers efficiently is imperative to the reputation of your business. This e-guide covers best practices for managing multiple channels, so you can prepare for communication from every angle.
Posted: 13 Feb 2013 | Published: 13 Feb 2013

SearchCRM

MicroScope – February 2022: Spotting the hidden security dangers
sponsored by MicroScope
EZINE: In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate
Posted: 03 Feb 2022 | Published: 04 Feb 2022

MicroScope

OT/IoT Security Report
sponsored by Nozomi Networks
RESOURCE: To help security teams and researchers of OT/IoT environments, this report focuses on three main areas: trends in attacks, vulnerability research, and best practices in remediation efforts and technology. Read on to learn more.
Posted: 14 Apr 2022 | Published: 15 Apr 2022

TOPICS:  .NET
Nozomi Networks