You've requested...

Download this next:

101 guide to simulation-based manufacturing

How can you boost your manufacturing process’s efficiency without sacrificing quality? Simulation-based manufacturing, Siemens argues, can help.

Check out this video for a quick introduction to how simulation-based manufacturing process planning can:

  • Support collaboration between engineering and production teams
  • Enhance validation capabilities
  • And more

These are also closely related to: "BlackBerry Smartphone Simulators"

  • Your guide to the leaders of the 2023 MITRE Engenuity ATT&CK Evaluations

    Since 2018, the ATT&CK Evaluations have provided the industry’s most sophisticated public attack simulations for security vendors to essentially “test their wares” against attack methodologies representative of real-world threats.

    In this year’s evaluation, only Palo Alto Networks prevented every step in the protection scenario and delivered an analytic detection in every substep of the two detection scenarios.

    In this e-book, take a comparative look at how endpoint security solutions performed in the most recent ATT&CK evaluation, and find out how Palo Alto Networks are stepping up to the challenge.

  • How Illumio performs against simulated ransomware attacks

    Ransomware presents a major threat to modern enterprises. In order to overcome ransomware, organizations need offerings that are proven to be capable of handling the most dangerous malware.

    This paper presents the results of an array of attack simulations aimed at testing the security capabilities of Illumio’s Core offering. The simulations mimic the attack patterns of ransomware infiltrations and measure the defense’s efficacy with a time to completion metric.

    Continue reading to learn more about Illumio Core and see how it holds up against emulated threats.

Find more content like what you just read:

  • Smart testing for Smart devices: 4 approaches

    To unlock insights about Smart testing for Smart devices, check out this webcast featuring Head of the Phygital (IoT) Testing Center of Excellence at Qualitest, Balaji Ponnada.

    Download

  • Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated

    This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.

    Download

  • Computer Weekly – 9 April 2019: Using data science at Sainsbury's

    In this week's Computer Weekly, we talk to retailer Sainsbury's about its data science strategy and how it helps the firm better understand customers. We take a detailed look at the evolution of the business intelligence market. And we find out how simulated disaster management can tackle the security skills gap. Read the issue now.

    Download

  • Royal Holloway: Purple team playbook – threat modeling for security testing

    The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams

    Download

  • AI-based application testing: Simulate attacks at scale

    With advances in AI capabilities, hackers have leveraged the evolving technology in order to perform more sophisticated attacks at scale. If actual attacks are using AI, then simulated attack testing that is performed at scale using AI is as close of a simulation to the real thing as one could hope for. Read on to learn more.

    Download

  • Computer Weekly – 2 April 2019: The nightmare driving test – making driverless cars safe

    In this week's Computer Weekly, we talk to AI experts about the challenges of teaching autonomous vehicles how to drive safely in often extreme environments. Our latest buyer's guide looks at business intelligence and analytics. And we examine the implications of the EU's controversial new copyright laws. Read the issue now.

    Download

  • Penetration testing; Find vulnerabilities before hackers can

    Every new technology introduced to your organization adds further complexity to the attack surface. Bitdefender offers customized Red Team Exercises that simulate real-life threat actors to identify vulnerabilities so that your security teams can resolve them before real hackers can exploit them. Read on to learn more.

    Download

  • How AllCloud can support your cloud journey

    Orion, a leading supplier of carbon black, wanted to migrate its highly complex simulations of chemical processes to the cloud. The company partnered with AllCloud to prepare the cloud journey, resulting in 20% faster calculations and improved manufacturing processes. Access the case study to explore how AllCloud can support your cloud journey.

    Download

  • IBV - CEOs guide to generative AI: Customer supply chain

    As real-time data fuels faster simulation and more accurate predictive analysis, it’s become easier for businesses to plan for tomorrow. That’s why CEOs are rapidly investing in generative AI to automate and streamline their supply chains. In fact, 89% of executives report that key investments in automation will include generative AI capabilities.

    Download

  • Self-driving cars: What tech supports their development?

    Self-driving cars must be able to interpret and respond to traffic signals. While leveraging a simulation environment to develop cars that can do so, Reply – a system integrator and technology solution provider – encountered this roadblock: a shortage of GPUs. In this case study, discover how Reply navigated that obstacle.

    Download

  • See the future of process monitoring and industrial IoT

    If you haven’t heard of the concept of digital twins (DTWIN), it’s a new way of thinking about and implementing distributed systems capable of controlling and anticipating deviations. This emerging technology is also positioned to become an important element for industrial digital transformation. Read on to learn more about this technology.

    Download

  • Securing identities in today’s digital business

    As organizations continue to evolve digitally, the volume of sensitive keys, identities, and data is increasing. Utimaco SecurityServer bundles 30 years of experience in cryptography and Hardware Security Module (HSM) technology into a unique offering that constitutes the root of trust for security and compliance. Read on to learn more.

    Download

  • Shortlist your refrigeration options via an eco-centric analysis tool

    Watch this video, designed for food retailers, to demystify the refrigeration technology purchasing process and to view Honeywell’s eco-efficiency simulation model that assists retailers in making their shortlist.

    Download

  • 4 ways organizations can use digital means to fuel sustainability

    As the threats of climate change loom closer, sustainability is a necessity for any organization’s long-term streak. This white paper explores the current state of sustainability and provides 4 ways organizations can use digital means to fuel sustainability. Read on to learn more.

    Download

  • Quantum computing: What are the data storage challenges?

    Quantum computing will process massive amounts of information. But, to be fully effective, quantum computing will need to access, analyse and store huge amounts of data. One area, in particular, will have to deal with significant challenges: data storage. How will today's storage systems keep pace?

    Download

  • Simulating organizational change to predict savings

    Changing legislation, increasing citizen demands, budget cuts and mergers are all factors putting pressure on the public sector to deliver IT organizational change. However, it is often difficult to get consistent data, work collaboratively, and accurately plan. Learn how Unit4’s suite of solutions can help in this video.

    Download

  • Computer Weekly – 14 August 2018: Infrastructure under attack

    In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.

    Download

  • Get to market faster: Core advantages of AWS’ AI & ML services

    This AWS e-book outlines 7 ways manufacturers can adopt smart cloud solutions to maximize productivity, asset uptime, quality, safety, revenue streams, supply chain visibility & sustainability. Read now to learn how AWS services & partners enable smart manufacturing.

    Download

  • Multi-pronged approach to cyber security professional development

    In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.

    Download

  • CW@50: March editions of Computer Weekly

    We search back through the Computer Weekly archives held at The National Museum of Computing to present what was happening in IT over the past five decades.

    Download

  • Enterprise mobility management software offerings and use cases

    Enterprise mobility management software allows IT to deploy security policies and provide access to internal resources by integrating with APIs in the mobile OSes. This e-guide shows enterprise mobility management software offerings and use cases.

    Download

  • Managing Android devices in the enterprise

    This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).

    Download

  • Top vendors in endpoint security heading into 2024

    As organizations begin to evaluate new endpoint security platforms, they have various needs to fulfill and a variety of vendors from which to choose. Based on the “must haves” many leaders are looking for in EPP and EDR solutions, discover the top-performing vendors for endpoint security in the last quarter of 2023 in this Forrester report.

    Download

  • Guide to MITRE ATT&CK & endpoint security

    Discover how Palo Alto Networks' Cortex XDR performed in MITRE's 2023 cyberattack simulations versus Turla. Achieving 100% visibility, it blocked all techniques, ensuring top-quality detections. Delve into the results and uncover Cortex XDR's effectiveness in this report.

    Download

  • Computer Weekly – 4 August 2020: The UK's $500m space technology gamble

    In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.

    Download

  • Computer Weekly – 4 August 2020: The UK's $500m space technology gamble

    In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.

    Download

  • How to tackle information overload

    In this week's Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the firm wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer's guide looks at network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.

    Download

  • Workplace Revolution: How HR technology is transforming the way we work

    In this e-guide, we explore how businesses around the world are using advanced HR technology to transform the way we work and to improve the efficiency of the workplace. We focus on how advances in artificial intelligence, virtual reality and data analytics are helping to propel HR and the workplace into the future.

    Download

  • Focus: Artificial intelligence in the enterprise

    This special report gives IT leaders a guide to the latest thinking in AI and machine learning, and looks at how these technologies could help in areas such as security, mobile, customer engagement - and even within the IT department itself.

    Download

  • CW Europe - March-May 2021: Nordic tech startups create blueprint for post-Covid working environment

    Business can learn lessons from Nordic tech startups to prepare employees to return to the office after Covid restrictions end.

    Download

  • The Managed Detection & Response Landscape

    Organizations of all sizes are turning to managed detection and response (MDR) solutions to quickly handle suspicious activity and contain threats. However, while MDR solutions have been proven, there are a lot of options in the market to choose from which makes picking the right solution for you a challenge. Read on to learn how to choose wisely.

    Download

  • Bluetooth Low Energy: The IoT battle

    This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.

    Download

  • CIO Trends #7

    Read some of our most popular articles on issues faced by IT decision makers, such as how to get the most out of the internet of things, and how to tailor your IT operating model to fit in the digital age.

    Download

  • Endpoint and antimalware protection for small to large businesses

    Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.

    Download

  • Computer Weekly – 30 January 2024: Tech companies warn EU over encryption plans

    In this week's Computer Weekly, tech companies are calling on the European Commission to rethink plans to weaken internet encryption – we explore the issues. We talk to credit rating agency Moody's about why it thinks now is the time to invest in quantum computing. Read the issue now.

    Download

  • 10 AI and machine learning trends

    Artificial intelligence technologies are transforming business processes and society at large. As enterprises expand the uses of AI, this field starts to move towards new domains, such as conceptual design, smaller devices and multi-modal applications. Here are 10 top 2022 trends IT leaders should prepare for now.

    Download

  • Computer Weekly - 16 February 2021: How Covid-19 has hit IT salaries and job prospects

    In this week's Computer Weekly, our salary survey reveals the impact of the coronavirus pandemic on IT professionals' wages and job security. A potentially deadly cyber attack on a US water plant highlight the risks to critical infrastructure. And we find out how NHS Scotland is using tech to support its vaccine roll-out. Read the issue now.

    Download

  • Staying on top of your mobile device fleet 24/7

    Mobile devices are now an essential and integral part of the modern workplace enabling employees, contractors, and third-party vendors to access a wide variety of business-critical applications and data. Learn how a 360° mobile device management (MDM) helps you stay on top of your mobile device fleet 24/7.

    Download

  • Computer Weekly – 28 March 2023: Is TikTok really a security threat to your business?

    In this week's Computer Weekly, with the UK government becoming the latest administration to ban TikTok, we ask whether the controversial social media app is really a security threat to enterprises. Read the issue now.

    Download

  • A Computer Weekly buyer's guide to going beyond desktop Computing

    A digital workplace opens up a range of new possibilities for businesses, but it needs to be implemented in the right way. In this 13-page buyer's guide, Computer Weekly looks at how digital workplaces demand increasing functionality, how to make sense of desktop as a service, and the value of unified endpoint management.

    Download

  • Rugged handheld computers purpose-built for healthcare

    Healthcare workers need to be employed with devices that are not only reliable but feature-packed, time-conservative and mobile. So, what can you expect when you purchase consumer smartphones — instead of rugged handheld computers purpose-built for healthcare? Download this infographic to find out.

    Download

  • What to look for in an SMB-ready mobile device

    Read this TechTarget e-guide to glean mobile device selection methods and best practices for SMBs, including what to look for in a mobile device, picking rugged mobile devices vs. consumer-grade ones, and deployment approaches.

    Download

  • 7 types of networks and their use cases

    A computer network is an interconnected system of devices, represented as network nodes, that share information, data and resources among each other. Not all networks are the same. In this e-guide, learn about the seven most common types of networks, their benefits and use cases.

    Download

  • Computer Weekly - 7 July 2020: The privacy challenges of easing lockdown

    In this week's Computer Weekly, as pubs in the UK re-open after lockdown, we examine the privacy issues around collecting customer data for contact tracing. We look at how interconnected devices are revolutionising the manufacturing and engineering sectors. And we assess GDPR progress two years after its introduction. Read the issue now.

    Download

  • Computer Weekly – 2 May 2017: How to deal with data under GDPR

    In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.

    Download

  • UKtech50 2018: The 50 most influential people in UK IT

    In this e-guide, you will find our definitive list of the movers and shakers in UK IT – the CIOs, industry executives, public servants and business leaders driving the role of technology in the UK economy. This is our top 50 most influential people in UK IT for 2019.

    Download

  • Accelerating Zero Trust Capabilities eBook

    The rapid growth of adversarial cyber threats emphasizes the need for the Department of Defense (DoD) to adapt and improve our deterrence strategies and cybersecurity implementations. In this whitepaper, Saviynt will hone in on the three specific pillars that require agencies to protect users, systems, and data at the identity layer.

    Download