You've requested...

Share this with your colleagues:

Download this next:

Cloud computing in the public sector

“Cloud” computing is a term being used in many different ways, many of them seeming to offer the ultimate silver bullet in providing an IT platform. However, many issues currently remain, and it is likely that cloud computing will be many years in maturation and acceptance in the mainstream business and public sector communities.

These are also closely related to: "Try LotusLive"

  • eGuide: Expert Tips for Deploying Secure Messaging Technologies

    The security of electronic communications has been hampered by too many standards and deployment options, making email, instant messaging (IM), and other web-based methods prime targets for hackers.


    This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies. Check out this eGuide and learn how encryption, user education, and other security strategies can effectively safeguard your company's data and resources.

  • MicroScope – June 2020: The surge in home working

    How Covid-19 kick-started a shift to home working

    The UK’s coronavirus-related lockdown has forced people to work from home and turn to the channel for support

    Unlocking the potential of a diverse workforce

    Yvette Steele, director of member communities at CompTIA, looks at the business benefits of opening the doors to a diverse workforce

    How Covid-19 has turned the IT events calendar on its head

    With coronavirus restrictions in place, IT vendors are replacing their conferences with digital events. Christine Horton looks at what this means for the channel

Find more content like what you just read:

  • Exchange Insider E-Zine vol. 11: Office 365, mobile devices, Exchange security

    In this edition of the Exchange Insider E-Zine, explore how to migrate to Office 365, support mobile devices and protect your Exchange Server environment from the latest threats.


  • Webmail Forensics: Investigating Issues with Email Forwarding Security

    In this expert e-guide, application security expert Mike Cobb discusses webmail forensics possibilities for dealing with the aftermath of an issue involving email forwarding. Discover how to avoid these issues with your webmail and employees.


  • Expert guide to mobile unified communications: Implementation best practices

    This expert e-guide uncovers the benefits of mobile UC, best practices for implementing fixed mobile convergence and mobile UC solutions as well as products that will make the execution easier.


  • Manage the full API lifecycle with one monitoring tool

    With the sheer number of applications in the cloud today, creating a strong application integration strategy is the key to success across every industry. Learn about the key benefits of an API lifecycle management tool in this whitepaper.


  • Marketing activity taxonomy: Creating one for your organization

    Marketing-speak can range from one organization to the next—a “program” to one person could be a “campaign” to you. Download this expert guide to explore the differences between channels, programs and campaigns, and learn how you can create a common taxonomy to avoid terminology confusion.


  • Connected enterprise is the key to collaboration and cutting costs

    This six-page Buyer’s Guide to Connected Enterprise explains how CIOs and senior IT professionals can harness connected enterprise to make their organisations more competitive through better responsiveness and decision making.


  • Are you making optimal enterprise collaboration purchases?

    In this 10-page buyer's guide, Computer Weekly highlights what the IT leader needs to know to decide on the future of the organization's communications strategy.


  • Presentation Transcript: Protecting Against Malware with Web Security Gateways and Services

    Many organizations are moving malware protection to the Web and investing in Secure Web Gateways. This  transcript will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products.


  • A Computer Weekly buyer's guide to enterprise app stores and self-service IT

    Computer Weekly assesses how businesses can go about setting up an enterprise app store and integrating it with IT service management in this 11-page buyer's guide.


  • The biggest hurdle for effective collaboration

    Today's collaboration tools combine many elements, making it easier to bring people, data, and applications together so they can communicate and share files easily With this guide, learn how an adaptive collaboration hub can help solve work fragmentation woes and explore 5 areas within an enterprise seeing the biggest impact.


  • Access management: Key terms & definitions

    The concept of access management was created to address the changing security threats that came as a result of cloud migration and remote device enablement. This handbook provides a glossary of key access management terms and definitions. Read on to familiarize yourself with the terms.


  • AI: Beyond the hype

    Artificial Intelligence is red hot. But what lies beyond the hype? Once it was big data, then cloud, now it is artificial intelligence, and that sub-set of it which is machine learning, that's generating more heat than light. Is there business value here?


  • Mobile messaging is the key to connecting communities

    Few could have envisioned the global success of SMS (short message service) when the first text message was sent in 1992. SMS has crossed network and technology boundaries, and continues to find new applications, as well as providing inspiration for industry innovation as IP (Internet Protocol)-based messaging builds momentum.


  • CW Special report on Symantec

    This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.


  • CIO Trends #7: Nordics

    This e-guide features articles outlining how Norway's tax office is fighting economic crime through the use of the latest IT, why Nokia has been at the centre of an investigation following a blackmail scandal and what caused Visa's global payment system to go offline in June 2018.


  • Backing up Microsoft 365 is your responsibility: How will you do it?

    Access this white paper to learn which storage strategy is best for backing up Microsoft Office 365, including key points to consider, storage statistics, and a cost comparison.


  • CEO impersonation: Inside BEC attacks

    Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.


  • CW+: MWD Strategic Insight: Understanding your requirements: online communities and team workspaces

    An increasing number of organisations are considering how online communities and team workspaces can help them be more collaborative both internally and externally with customers and partners. If you’re thinking about, or have already started developing a strategy for an online community.


  • Containers vs. VMs: Understanding the differences

    In this e-guide, get the lowdown on containers and VMs, the relationship between the two technologies and what tech companies are doing to support the growing use of container technology.


  • Securing Data, Not Endpoints: The Best Way to Control Consumerization

    Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.


  • Ready to quickly realize significant benefits with SAP in the cloud? Read this

    While moving simpler workloads to the cloud, many businesses wonder whether it's possible to get all the benefits of cloud—the power, control, scalability, flexibility, and cost savings—if they still move core application like SAP workloads. The answer is yes.


  • How to create an effective data protection strategy for IT compliance

    Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This tip guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.


  • 3 top topics of conversation in monitoring

    Access this analyst report to see 451 Research's Application and Infrastructure Performance Market Map for 2019 which includes the top topics of conversation in monitoring.


  • Computer Weekly - 21 April 2020: Taking robot technology to a New World

    In this week's Computer Weekly, we talk to the technology team behind a project to recreate the voyage of the Mayflower using a fully autonomous ship. We look at how India's coronavirus lockdown is affecting UK companies that use offshore outsourcing. And we examine the challenges of making edge computing work. Read the issue now.


  • Apply AI to IT operations to maximize efficiency and reduce costs

    CIOs of the future will be able to use IBM’s AI-powered insights platform across their IT landscapes and development toolchains to transform internal experiences, reduce risk, exceed client expectations and deliver value. Check now the features and the benefits brought by IBM Cloud Pak for Watson AIOps


  • Combating lead gen challenges: Establishing organizational alignment

    When sales and marketing talk about lead generation, tensions often arise. While disagreements are normal, there are important steps you can take to prevent them from undermining what you’ll need to continuously improve. Find out what those steps are – and how to successfully take them – in this expert e-book.


  • Intro to email & file transfer security

    As email grows in importance as a communication tool, it becomes an increasingly attractive target for cybercriminals – and protecting inboxes becomes more critical than ever. Read this white paper to discover the essentials of email security and ensure your organization is equipped to handle today’s threats.


  • Going beyond endpoint protection

    It’s time to sit down and really think about your endpoint protection. 78% of people are now working remote, which means that endpoints are more vulnerable than ever – plus, remote breaches are harder to identify and contain. So, what can you do to keep threats away from remote endpoints? Let this infographic shed some light.


  • Analysis of the changing internet risk landscape

    Dive into Rapid7’s National / Industry / Cloud Exposure Report (NICER) report which focuses on the unique exposures for the Nordics and notable highlights and recommendations specific to the following countries: Denmark, Faroe Islands, Finland, Greenland, Iceland, Norway, and Sweden.


  • Interactive Marketing eBook: It’s all about the Journey

    No matter where you are on your journey to Interactive Marketing, you can get there with the right marketing software solutions. When you achieve effective, efficient, measurable marketing that creates meaningful dialogue, you ensure increased lifetime customer value. This eBook reveals just some of the important steps along the journey.


  • AIOps-driven mainframe and IBM i insights

    IT Event Management software typically omits IBM i and mainframe systems – leaving organizations with a blind spot. Dive inside this white paper to learn about a way to implement AIOps-driven event management capabilities seamlessly across mainframe and IBM i data.


  • Getting Started with CASB

    Migrating your business to the cloud can increase business agility, flexibility and efficiency. But it also changes your cybersecurity. Without a perimeter, sensitive data can be shared without oversight. And cyber criminals can compromise user accounts to steal funds and data. Read this white paper to learn 4 reasons you should consider a CASB.


  • Focus: Securing for the future

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.


  • 2019 APAC IT Priorities

    In this e-guide, gain insights into the pain points and priorities of IT organisations across the region, and how they are keeping pace with the demands of digital transformation.


  • Mobility Management Selection Guide

    This exclusive paper takes an in-depth look at the criteria you can use to select the optimal enterprise mobility management system that can meet your specific, fast-paced, and consistently changing requirements.


  • Automating data sharing to speed time to action

    Businesses are always pushing for faster “time to action,” but limitations on data architecture stand in the way of speed. What if there was a way to ensure data is instantly available throughout your organization? Read this white paper to learn how automated, real-time data sharing can empower your business to act with speed and accuracy.


  • How to map content to the buyer¿s journey

    Open this white paper to learn how to map content to your buyers’ buyer journeys to get them the information they need, and sales made.


  • CW+: BDNA: IT asset management user trend survey

    IT asset management and discovery tools - the user's view.


  • Accelerating deep neural networks with analog nonvolatile memory devices

    Here, you will learn about the opportunity and the challenges of neuromorphic computing, analog memory materials and devices, circuit and architecture choices and challenges, and the current research status and prospects.


  • Why partners are key to creating a secure cloud

    The value of a cloud platform grows with each partner that joins the ecosystem. In the case of financial services, the cloud provider can nurture its partner network by working closely with members to ensure that they adhere to a comprehensive set of standards. Learn how to “embrace the ecosystem” with partners in this guide.


  • Avoid migrating: A guide to modernizing legacy apps

    Is it worth maintaining legacy apps, or should you take the risk of moving to something new? Take a look at this whitepaper to learn how to think of these issues as opportunities and modernize your legacy apps with optimized workflows and integration.


  • Track finance’s shifting opinions of the cloud here

    Less than 20% of financial services workloads are in public cloud today. However, as remote work changes the business climate, financial institutions are finally changing their mind about the cloud—so much so that PwC claims a public cloud model will become the dominant infrastructure model beyond 2020. Learn more about this shift here.


  • Public cloud compliance & security for financial services

    The financial services industry is perhaps the most highly regulated in the world. In the U.S., banks must comply with at least 10 major regulations at the federal level alone. So how, then, are financial services firms to migrate to the cloud in a secure and compliant manner? Read this IBM white paper to see some suggestions.


  • CW+: Special report on Accenture

    When Bill Green spelled out his vision for Accenture in a rare interview shortly after taking over as chief executive six years ago, he said the company would “dream up and build services so powerful and so exceptional that they will be required to compete in any industry, from financial services to manufacturing”.


  • Mainframe and hybrid cloud environments drive modernization together

    According to Deloitte’s 2020 Mainframe Market Pulse Survey, IT leaders are incorporating the mainframe as a critical aspect of their hybrid cloud environments. In this guide, learn how mainframe and hybrid cloud environments are driving modernization together, from solving security issues to innovating at the edge.


  • How IBM is cracking cloud encryption complexity

    The best encryption algorithm in the world is useless if the key is compromised. The solution for many is using a hardware security module—but it’s not so simple in the cloud. Installing and maintaining secure hardware in the cloud provider’s physical location is awkward at best. Learn how IBM is cracking cloud encryption complexity in this guide.


  • Evaluating security analytics in the cloud

    Security analytics are both emerging and evolving. Providers that offer customizability, map to the MITRE ATT&CK framework and have a vision for extended detection and response (XDR) give themselves an advantage. To learn more about security analytics providers and how they stack up, access The Forrester Wave: Security Analytics Platforms, Q4 2020.