You've requested...

Download the Fall 2009 edition of Perform Magazine

If a new window did not open, click here to view this asset.

Download this next:

How to prepare your network for IoT data challenges

This e-guide outlines how business requirements will affect your IoT network build, takes a deep dive into specific IoT network architecture and explores IoT topology options.

These are also closely related to: "Download the Fall 2009 edition of Perform Magazine"

  • Ultimate IoT implementation guide for businesses

    The internet of things provides organizations with real-time information and business insights that, when acted upon, can ultimately make them more efficient.

    IT administrators, architects, developers and CIOs considering an internet of things deployment must have a thorough understanding of what the internet of things is, how it operates, its uses, requirements, tradeoffs and how to implement internet of things devices and infrastructures.

    In this e-guide, learn the requirements and use best practices for a successful deployment.

  • 11 top IoT online courses to boost your career

    Internet of things (IoT) is a premier technology of the 21st century. Recent research revealed the increasing importance of IoT in industrial applications, predicting that investment in IoT will soon overtake main technologies such as cloud computing, big data analytics and next-generation security. Beyond its market benefits, IoT also represents a career opportunity for anyone willing to learn more about how to design and build IoT systems. In this infographic, we selected 11 options for learning about IoT and related technologies, from introductory to advanced levels.

Find more content like what you just read:

  • 9 IpaaS use cases for the enterprise

    iPaaS has gained significant traction in recent years to provide a common foundation for many complex and diverse business integrations. IPaaS provides an array of readily available integrations with tools for users to assemble custom integrations and data flows. Here are 9 examples to help you understand how it all works.

    Download

  • Quick guide to securing IoT devices

    As they deploy more IoT devices, organizations are challenged to figure out how to secure them. To unlock a quick guide to IoT security, dig into this white paper.

    Download

  • Optimize your recruiting process with 6 essential hiring dashboards

    Discover the 6 hiring dashboards every recruiting team needs to centralize data, visualize trends, and optimize the hiring process. Download this white paper to learn how to build the perfect dashboard for your organization.

    Download

  • VxWorks + containerized apps: What you need to know

    The security, portability, and agility of container technology complement the proven capabilities of the real-time operating system (RTOS), VxWorks, now available for containerized deployments at the intelligent edge. Download this white paper to learn more.

    Download

  • Royal Holloway: Securing connected and autonomous vehicles

    This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.

    Download

  • Guide to edge computing in a cloud native world

    What really is edge computing? And how are near edge, far edge and tiny edge different? This guide explains what edge computing means for your business and how you can take advantage of it in a cloud native world. Read it here.

    Download

  • Edge security: Defending against rogue devices and more

    In addition to driving connected intelligence, edge networking and computing can leave organizations vulnerable to increased security risks. To discover how you can address those risks with help from AI, and to unlock insights from Executive Partner at Independent Security Evaluators Ted Harrington, check out this white paper.

    Download

  • Maximising the Business Value of AI with a Digital Platform

    Digital businesses prioritize AI for growth (C-suite view it as a top investment). This IDC infobrief explores how a secure digital platform empowers AI for a competitive edge. Most companies are still building platforms, while leaders leverage AI for significant benefits.

    Download

  • Analyst report: How to maximize AI value with a digital platform

    As companies enhance digital capabilities, maximizing AI value is critical. This IDC report explores how a digital platform approach can help organizations drive business impact through AI, improve customer experience, and achieve better outcomes. Download the full report to learn more.

    Download

  • Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated

    This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.

    Download

  • All-Flash: The Essential Guide

    This guide offers a comprehensive survey of the all-flash array market. We look at all-flash products from the big six storage vendors and the startups and specialists. Plus, we give the lowdown on all-flash vs hybrid flash arrays and all-flash vs server-side PCIe SSD.

    Download

  • Global Connectivity Index 2016

    The Global Connectivity Index (GCI) 2016 from Huawei measures the progress of 50 nations in investing in and deploying Information and Communications Technology (ICT) to achieve economic digitisation

    Download

  • Discover the 4 keys to successful AI projects

    Discover the four key things you need to know before starting an AI project. Learn how to de-risk your AI initiatives, upskill your team, and leverage a proven hybrid platform to achieve higher ROI. Read this e-book to unlock the full potential of AI for your enterprise.

    Download

  • 3 steps to turn customer experience insights into business impact

    This guide outlines 3 steps to turn customer experience insights into meaningful business impact - investigate trends, collaborate across teams, and validate evidence for executive buy-in. Learn how to drive CX excellence by reading the full white paper.

    Download

  • Six Critical Capabilities of Saviynt’s Application Access Governance

    Moving to Zero Trust can improve security while enabling users with right-time, right-level access. The process requires moving from a mindset of implicit trust to the continuous re-evaluation of risk. Read this white paper to learn more about the three key aspects to a successful Zero Trust adoption.

    Download

  • FedRAMP compliant UC

    A top 10 federal defense contractor with over 20,000 employees was managing a complex environment with large Avaya and Cisco footprints for PBX and contact center. They required a FedRAMP environment that provided a seamless consolidation of collaboration, conferencing and voice. Download this case study to learn how they got it.

    Download

  • Top 10 ASEAN stories of 2018

    In this review of the top Computer Weekly articles focused on IT in ASEAN, we look at Ascend Money's adoption of OpenShift, Go-Jek's experience with the cloud and Singapore's approach to the internet-of-things, among other developments.

    Download

  • OWASP Top Ten: How to keep up

    The newest addition to the OWASP Top Ten was recently published to help organizations assess their application security efforts – but false positives could lead to unnecessary stress. Download now to learn how Contrast’s observability platforms is designed to keep up with the rapidly expanding scope of the OWASP Top Ten.

    Download

  • Keeping up CX with cloud contact center solutions

    When this home retailer began to struggle with the limitations of their on-premises contact center system, they sought out a cloud-based solution that could offer them the self-service capabilities and omnichannel services they needed. That’s when they found InflowCX. Browse this white paper to hear the full story.

    Download

  • Sensible one-page thoughts on managing performance

    Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of short, digestible articles, written especially for Computer Weekly.

    Download

  • 3-step guide to winning CFO support for a recruiting CRM

    To secure a recruiting CRM, show your CFO how it solves critical hiring challenges and delivers ROI through cost savings. Download this guide to build a CFO-proof business case for your recruiting CRM.

    Download

  • Proactive Security: Software vulnerability management and beyond

    In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.

    Download

  • Premier Fortune 500® Technology Company Saves 30% on IT

    Mergers and acquisitions create turmoil in organization’s IT. To help a Fortune 500 company smooth their transition after acquiring a new organization, they turned to ARG. Access the case study here to learn how they more than doubled their initial goal to reduce network spending by 15%.

    Download

  • What’s the ROI of Rancher Prime for Kubernetes?

    Rancher Prime is designed to help simplify the management of your Kubernetes clusters at scale. This Total Economic Impact (TEI) report from Forrester examines the possible ROI you could realize with Rancher and provides a framework for you to evaluate the financial impact of the platform if you choose to adopt it. Access the Forrester TEI report.

    Download

  • Moral injury vs burnout: Solving a systemic healthcare issue

    It’s no secret that it’s hard to be a physician in the US. A growing physician crisis can be attributed to burnout and its effects, but many healthcare organizations fail to recognize the role of moral injury as well. In this white paper, discover how moral injury differs from burnout and learn how you can combat it with effective solutions.

    Download

  • Digital experience focus broadens to encompass employees

    This e-guide to employee experience includes a podcast discussion about the evolution of employee experience management. Also, we explore how advanced companies are responding to skills shortages and millennial employee attitudes by listening harder to their workforces.

    Download

  • Are you making your users pay a Time Tax?

    Time tax refers to the irritating, inefficient, and time-wasting processes imposed on members of the public in exchange for public assistance. Are you making your users pay a Time Tax? Download this white paper and fill out the quiz to discover if you’re guilt of any of the common time tax pitfalls.

    Download

  • IT investments: 1,500 organizations’ obstacles & experiences

    To understand the top obstacles to maximizing the value of your organization’s IT investments, review this 19-page report, which is informed by the survey results of 1,500 ARG clients.

    Download

  • Enable End-to-end Zero Trust To Achieve Effective Outcomes

    Illumio was highlighted as a leader in The Forrester Wave: Zero Trust eXtended Ecosystem Platform Providers report based on their current offering and strategy regarding end-to-end Zero Trust in the post-perimeter era. Read this report to learn more about Illumio’s offering and discover why Forrester gave it such high regards.

    Download

  • Discover 9 microsegmentation vendors and how they stack up

    To meet their microsegmentation needs, buyers should look for solutions with flow and asset discovery, visualization, a wide range of supported operating systems, and segmentation at the process level. Access this Forrest Report to discover how well 9 of the most significant vendors stack up when scored against 10 criteria.

    Download

  • Key data governance considerations: Picking the right tool for you

    In this expert e-guide, we explore key evaluation factors for selecting the right data governance tool to suit the needs of your organization. Find out which metrics matter most when it comes to picking your tool, like handling metadata objects, managing data quality, addressing unstructured data, and more.

    Download

  • 31-pg eBook: Research into top security threats, business preparedness

    This cybersecurity report details how you can become a Fit for the Future (FFTF) business; organizations that take a very different approach to security challenges, resulting in increased revenue, ESG commitment, and reduced impact from cybersecurity attacks. Explore the report here.

    Download

  • Keys for building effective recruitment marketing strategies

    Discover the elements of a strong recruitment marketing strategy to attract top talent. Learn how to define your EVP, create candidate personas, leverage social media, and more. Download this e-book to build an effective inbound recruiting program.

    Download

  • CW APAC: Buyer's Guide to human capital management

    In this buyer's guide, focused on human capital management (HCM) in the Asia-Pacific region, we look at the advantages of HCM software in recruitment, the importance of listening to staff and the considerations that should be made when using work algorithms.

    Download

  • ERP buyer's guide: What merchants & distributors should know

    This buyer's guide for merchants and distributors explains key features to look for in an industry-specific ERP system, including online integration, route optimization, EDI, warehouse management, and more. Learn how the right ERP can streamline your operations and drive growth. Read the full guide.

    Download

  • Business Grade Workforce Solutions Without Compromise

    This paper explains how by working together, Dell Technologies, Intel, and Microsoft give you access to market leading business grade workforce solutions – without compromise.

    Download

  • Beginner's guide to Internet of Things

    The adoption of IoT in Asia-Pacific has accelerated over the past few years, spurred by growing digitalisation across the region and the desire to improve business processes. In this e-guide, learn more about IoT developments across the region and how to leverage the technology to drive business outcomes.

    Download

  • Your Scope 3 calculator: Uncover your data center’s Scope 3 GHG emissions

    In this white paper, discover how an individual data center can quantify Scope 3 emissions and identify the largest emission sources, all with a useful calculator that estimates your data center’s footprint and potentially overlooked opportunities to reduce emissions.

    Download

  • Computer Weekly – 16 August 2022: Broadband reaches for the stars – the new space race

    In this week's Computer Weekly, we look at the latest space race, as satellite firms compete to provide high-speed connectivity. Is the datacentre sector hindering house building in the UK? We find out what's really going on. And we talk to the IT director of the Mercedes Formula One team about how data helps to win races. Read the issue now.

    Download

  • CISSP Exam Guide Chapter 1 sample download

    In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.

    Download

  • Top vendors in endpoint security heading into 2024

    As organizations begin to evaluate new endpoint security platforms, they have various needs to fulfill and a variety of vendors from which to choose. Based on the “must haves” many leaders are looking for in EPP and EDR solutions, discover the top-performing vendors for endpoint security in the last quarter of 2023 in this Forrester report.

    Download

  • How leading contact center-as-a-service solutions stack up

    In this analyst report, discover how the top-ranking CCaaS solutions stack up against the competition, and find out which solution is best for your enterprise.

    Download

  • 10 networking predictions for 2024: Analyst insights

    In this 2024 IDC report, review 10 predictions about the future connectedness, which concern GenAI adoption, SD-WAN and much more.

    Download

  • Open-source security: Practical tips and best practices

    Open-source software offers many benefits, but also introduces new security risks. This guide covers best practices for managing open-source packages, dependencies, and vulnerabilities to secure your Python and R software supply chain. Access the e-book now to learn more.

    Download

  • Mastering recruitment metrics to improve hiring efficiency

    Discover how to leverage recruitment metrics to transform recruiters into talent acquisition authorities, debug hiring funnels, forecast progress, and demonstrate recruiting's impact on the business. Download the in-depth guide to learn more.

    Download

  • Financial service leader’s guide to compliance

    In January of 2025, the EU will begin enforcing the Digital Operational Resilience Act (DORA). This guide provides a more detailed breakdown of the compliance law and provides you with the information and resources you need to prepare your organization to meet the regulations. Access now to learn more.

    Download

  • Sustainable network innovation with Red Hat & partners

    Intel, Ericsson, and Red Hat partner to drive sustainability initiatives in telco networks. By optimizing hardware, software, and power management, they aim to reduce energy consumption by over 20% without compromising network performance. Learn more in the full white paper.

    Download