Global Flexibility with Local Performance in Architecture
By: NVIDIA VMware View more from NVIDIA VMware >>
Download this next:
Top 10 datacentre stories of 2021
By: TechTarget ComputerWeekly.com
Type: eBook
The 2021 datacentre news cycle has been dominated by stories about how demand for hyperscale datacentre capacity is continuing to boom, while market watchers grow increasingly concerned about how all this growth is affecting the environment. With this in mind, here's a look back over Computer Weekly's top 10 datacentre stories of 2021.
- Cloud and datacentre giants unite to create climate neutral EU datacentre industry by 2030
- Government gets updated powers to intervene on tech-related M&A deals on national security grounds
- OVHcloud confirms no casualties following fire at Strasbourg datacentre campus
- Average size of hyperscale datacentres is on the rise
- Climate change and datacentres: Weighing up water use
- The Cambridge-1 switch-on: UK’s most powerful supercomputer goes live
- QTS acquired in $10bn datacentre deal
- Government flags opportunity for re-use of waste datacentre heat in net-zero strategy
- Dublin in distress: Power supply issues threaten growth of Europe’s second-biggest datacentre hub
- The second coming: The Nordic datacentre market comes of age
These are also closely related to: "Global Flexibility with Local Performance in Architecture"
-
Breaking Free from Leads-Based Models
By: TechTarget
Type: TechTarget Media
Why should B2B marketing teams shift away from Marketing Qualified Leads (MQLs)? Forrester and TechTarget can name seven reasons.
#1: MQLs can ignore signals that are valuable to sellers.
Along with mapping out the rest of the reasons, this e-book – Get Off the MQL Hamster Wheel. Get On With Winning Deals. – considers how organizations can evolve their revenue engine.
Read on to unlock these insights, which are informed by Forrester VP and Principal Analyst Terry Flaherty’s keynote webinar at TechTarget’s Reach event.
-
Top 10 artificial intelligence stories of 2019
By: TechTarget ComputerWeekly.com
Type: eGuide
According to Gartner’s 2019 CIO Agenda survey, organisations that have deployed artificial intelligence (AI) grew from 4% to 14% between 2018 and 2019. Organisations are looking to take advantage of smart speakers such as Alexa and Google Home to provide another channel to market, and are rolling out chatbots as an alternative to call centre staff, to deal with common queries. These are Computer Weekly’s top 10 AI articles in 2019.
Find more content like what you just read:
-
Pipeline-native scanning for modern application development
By: Contrast Security
Type: White Paper
Tap into this white paper to learn about an approach to application security that uses demand-driven static analysis to automatically triage vulnerabilities according to next-step actions within a modern development environment.
-
Enterprise Strategy Group (ESG): The state of zero trust
By: Portnox
Type: ESG Infographic
89% of cybersecurity professionals expect their organizations’ zero-trust support spending to increase over the next 12-18 months. In this infographic, TechTarget’s Enterprise Strategy Group (ESG) compiles key findings from a recent study to paint a picture of the current zero-trust landscape. Download now to learn more.
-
Analyst report: 239% ROI from IBM Security Qradar SIEM
By: Ironside Group
Type: Forrester Total Economic Impact Report
As cyberthreats proliferate, so do security alerts. Because of this, security analysts are pressed to quickly and thoroughly investigate frequent incidents. In this Forrester TEI report, learn how analysts have saved 90% more time when investigating incidents.
-
Focus: Desktop virtualisation and mobility
By: TechTarget ComputerWeekly.com
Type: eGuide
In this guide, we take a close look at how a number of CIO from a wide range of industries have sought to address the demand for mobile working within their organisations, and the technologies they have deployed to ensure data security and access is maintained at all times.
-
Datacentre design: Building leaner, greener server farms
By: TechTarget ComputerWeekly.com
Type: eGuide
The need for energy efficiency, resiliency and security have, for many years, been the driving forces behind the way that operators have approached building their datacentres. In this e-guide, we take a look at how the need for energy efficiency and sustainability is altering the way operators approach their datacentre builds and designs.
-
Redefine data visualization and insights with AI
By: FCN
Type: White Paper
To accelerate insights, engage with predictive analytics, enable 3D visualization—these are three of the many AI use cases that businesses in all industries are tapping into. Take a look through this white paper to learn about one way that your organization can harness the power of AI: leveraging a PowerEdge server.
-
Exhaustive Kubernetes e-book: 29 patterns for cloud app development
By: Red Hat and Intel
Type: eBook
This exhaustive O'Reilly e-book aims to help developers discover and learn about the most common patterns for creating cloud-native applications with Kubernetes. Read the book now, or save it for reference material in a pinch.
-
7 advantages of a SaaS-based application security program
By: Veracode, Inc.
Type: Resource
In this infographic, discover 7 advantages of a SaaS-based application security program vs. on-premises.
-
The next wave of IoT in Asia: What to expect in 2018
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read about the APAC businesses that have successfully implemented IoT initiatives and are already reaping the benefits, such as achieving increased ROI and reducing operational disruptions.
-
Aligning risk & service models for operational resilience
By: ServiceNow
Type: White Paper
Integrating an entity hierarchy into risk management aligns with CMDB and CSDM for risk visibility. Maturing from tactical to service-centric, it includes third parties, enhancing accountability and transparency. Read to build a robust framework aligned with business services and infrastructure.
-
Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.
-
Deep learning for countering energy theft – a hybrid long-short term memory approach
By: TechTarget ComputerWeekly.com
Type: Research Content
Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.
-
Computer Weekly - 8 February 2022: Exploring the metaverse
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, the metaverse is set to become a highly competitive commercial playground –profitable markets but also high-profile failures will follow. IT contractors have been hit by cyber attacks on the firms that pay their wages – we examine the impact. And we ask if it's time to plan for quantum computing. Read the issue now.
-
5 principles for securing DevOps
By: Veracode, Inc.
Type: White Paper
Integrating security operations into pre-existing DevOps processes can yield numerous business benefits – including a measurable growth in both profit and revenue. Read this whitepaper to unlock the 5 principles of DevSecOps to help you get started.
-
Media Consumption Study 2017 UKI
By: TechTarget ComputerWeekly.com
Type: eGuide
The results of TechTarget and Computer Weekly's annual reader survey, which asks for feedback on readers' media consumption when considering an IT purchase, reveals the complexity of IT purchase decisions.
-
How can a data security platform complement a DLP tool?
By: Cyera
Type: eBook
A lack of contextual awareness: This is one of the myriad challenges that many data loss prevention (DLP) tools can present. Along with delving into that obstacle and two others, this e-book explores how a data security platform can complement DLP tools. Continue on to unlock the full insights.
-
Computer Weekly - 17 March 2020: How NHS Digital is helping support the coronavirus crisis
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we talk to NHS Digital about how technology is supporting the health service's response to the coronavirus crisis. We examine the challenges of running a successful security operations centre. And we look at the emerging datacentre architecture based on composable infrastructure. Read the issue now.
-
AWS Quickly and Easily Scale and Secure Your Serverless Applications
By: Contrast Security
Type: White Paper
According to Forrester, 25% of developers will be using serverless technologies by next year. However, many organizations have concerns about how legacy application security approaches can support serverless applications. Discover the new serverless security trends that have been cropping up in response to these concerns in this report.
-
A Computer Weekly buyer's guide to deep learning
By: TechTarget ComputerWeekly.com
Type: eGuide
Deep learning can help companies operate faster and more efficiently. In this 13-page buyer'sguide, Computer Weekly looks at the advanced tools available for developers building intelligentapps, the frameworks that can be used and the kit that can enhance a programmer's toolbox.
-
Computer Weekly – 27 April 2021: Justice at last in Post Office IT scandal
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, 12 years after we broke the story, victims of the Post Office IT scandal finally have their criminal convictions overturned. We take a virtual tour of a Microsoft datacentre and meet a server called 'Mega-Godzilla Beast'. And we find out how technology is transforming Nationwide Building Society. Read the issue now.
-
Unlocking the Opportunity of SIEM Technology
By: TechTarget Security
Type: eGuide
Explore how a security information and event management (SIEM) system works, what types of data you can integrate into it, the process for detecting threats/incidents, and steps you should take to develop a successful SIEM capabilities.
-
Independent analysis of Bitdefender GravityZone
By: Bitdefender
Type: White Paper
Hackers are constantly advancing their tools and strategies to perform attacks more effectively. But when compared to those of hackers, how do your tools compare? This white paper presents the results of an independent test conducted by AV-Comparatives to provide an objective analysis of Bitdefender GravityZone. Read on to learn more.
-
Deploy ML across the hybrid cloud without being limited by architecture
By: Red Hat
Type: Product Overview
Discover in this product overview how Red Hat OpenShift AI can help your team develop, train, test, and deploy ML across the hybrid cloud without being dragged down by limited architectural choices.
-
The Evolution of Threat Detection and Management
By: TechTarget Security
Type: eGuide
This e-guide from SearchSecurity.com explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.
-
Enterprise Strategy Group: How to secure your development practices
By: Contrast Security
Type: ESG Showcase
This report from primary research and analyst firm Enterprise Strategy Group (ESG) outlines the significant consequences of failing to modernize your application security strategy and provides an actionable roadmap that developers can follow to secure their development practices from the outset.
-
CW Europe - June-August 2022: Russia escalates cyber war on Ukraine
By: TechTarget ComputerWeekly.com
Type: Ezine
Microsoft has given details of cyber attacks on Ukrainian civilian communications, nuclear safety authorities, and the exploitation of the destruction of Mariupol in a phishing campaign.
-
Next-generation DAST: Introducing interactive application security testing (IAST)
By: Contrast Security
Type: White Paper
While dynamic application security testing (DAST) has been a go-to AppSec testing technique for decades, it is not without its drawbacks. This is where interactive application security testing (IAST) comes into play, building off of DAST, but analyzing apps from the inside out, rather than from the outside in. Read this white paper to learn more.
-
Perimeter Security Noise Leaves Applications Vulnerable to Attacks
By: Contrast Security
Type: White Paper
Learn how you can get AppSec protection that can compensate with the necessary visibility, accuracy, scalability, and ease of deployment to keep pace with modern application vulnerabilities without generating false positives and false negatives.
-
Pulse Survey: "Organizations Struggle to Measure and Monitor Cyber Risk"
By: Tanium
Type: Analyst Report
Data from this Harvard Business Review Pulse Survey, commissioned by Tanium, illuminates how effective cyber-risk oversight is hampered by the mutual shortage of knowledge between executives and cybersecurity leaders. Read the report to learn from top executives and analyze the data for yourself.
-
How to accelerate the adoption of IoT within your organization
By: Ensono Limited
Type: White Paper
In white paper, join Ensono analysts as they try to surface some of the most important elements to consider when rolling out IoT and how you can accelerate the adoption of IoT within your organization.
-
Computer Weekly – 23 January 2024: Davos 2024 – AI disinformation tops global risks
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, AI-generated disinformation and misinformation will be the top risks for businesses, governments and the public over the next two years, according to the WEF. Intel's CTO discusses the chip maker's plans for the European market. And we examine the dearth of digital skills among elected officials. Read the issue now.
-
OWASP Top Ten: How to keep up
By: Contrast Security
Type: eBook
The newest addition to the OWASP Top Ten was recently published to help organizations assess their application security efforts – but false positives could lead to unnecessary stress. Download now to learn how Contrast’s observability platforms is designed to keep up with the rapidly expanding scope of the OWASP Top Ten.
-
Can AI take education to a new level?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we examine how LLMs are being used to teach, support and assess students, enhancing education rather than impairing it. We look at how AI is impacting the semiconductor sector as big tech companies put off server upgrades. And we find out how GenAI is changing the way enterprise software works. Read the issue now.
-
Protect against attacks with superior detection
By: Crytica Security, Inc.
Type: Product Overview
Research shows that the average time it takes for an organization to detect a cyber infiltration is 180 days. Crytica brings to the cybersecurity arsenal a new and powerful detection technology that can help reduce this ‘dwell time’ so you can stop attacks before it’s too late. Read on to learn more.
-
The metaverse explained: Everything you need to know
By: TechTarget ComputerWeekly.com
Type: Infographic
The metaverse is considered to be the next evolution of the internet, and its possibilities are virtually infinite to those who learn how to master this new digital universe. In this infographic, we put together everything you need to know about the metaverse.
-
Computer Weekly 23 July 2019: How Apollo 11 influenced modern computing
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, on the 50th anniversary of the Moon landings we look at the influence Apollo 11 had on modern hardware and software. Our latest buyer's guide examines data protection. And we find out how retailers with physical stores are using technology to respond to the rise of online shopping. Read the issue now.
-
Navigating risk adjustment challenges for healthcare into 2024
By: ZeOmega
Type: eBook
Without risk adjustment, Medicare and Medicaid would be unable to properly provide for millions of Americans. In this comprehensive 25-page e-book, explore an analysis and forecast by ZeOmega’s experts in risk adjustment solutions,
-
Computer Weekly - 24 August 2021: How datacentre power growth is leaving Dublin in distress
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look at the challenges faced by Dublin's datacentre sector, as growth leaves the city's electricity infrastructure creaking. We ask whether recent initiatives to close the UK's digital skills gaps are working. And we examine the latest injustice to hit the Post Office Horizon scandal. Read the issue now.
-
Building the foundation of a mature threat hunting program
By: Tanium
Type: eBook
Many of today’s organizations are at the mercy of their third-party partners’ security as well as their own. Read this e-book, Building the Foundation of a Mature Threat Hunting Program, to learn effective hunting strategies and how to address critical visibility and data gaps.
-
High-quality data for AI: 7-step roadmap
By: Hinduja Global Solutions
Type: White Paper
Data powers AI and predictive analytics, which power better decision-making. So, before organizations can level up their decision-making capabilities, they first have to ensure that their data is high quality. In this 12-page white paper, unlock a 7-seven roadmap for accomplishing that goal.
-
Five Tips to Improve a Threat and Vulnerability Management Program
By: TechTarget Security
Type: eGuide
Access this e-guide for 5 expert tips to improve the effectiveness of an enterprise threat and vulnerability management program.
-
Leads 101: Types, Attributes, and Second-Party Intent in Focus
By: TechTarget
Type: BrightTALK Webinar
Before you can fine-tune how you leverage leads in your marketing endeavors, first you need to understand the different types of leads. For a lesson on the major lead categories, tune into this webinar, which features insights from TechTarget’s CMO and Vice President of Demand and Integrated Solutions.
-
A university’s path to Wi-Fi 6: Case study
By: FourNet
Type: Case Study
Leeds Beckett is a leading public university with over 28,000 students. Key to supporting those students is facilitating seamless digital experiences. To do so, Leeds Beckett set out to modernize its network infrastructure. So, how did the university accomplish that mission? Find out in this case study.
-
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
By: TechTarget ComputerWeekly.com
Type: eGuide
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
-
Keep attackers at bay with tailored threat intelligence
By: Kaspersky
Type: White Paper
Threat intelligence (TI) that isn’t tailored to your organization isn’t real intelligence. So, how can you get TI that’s right for you? Find out in this e-book, which outlines the differences between intelligence and data, when and where to use TI, how to maximize the benefits of TI for your organization, and more.
-
6 key criteria for developer-first secrets scanning solutions
By: Palo Alto Networks
Type: White Paper
Hardcoding secrets enables developers to seamlessly access or authenticate the services needed to build and deploy applications. But those secrets, if not stored securely, present a huge risk. This checklist presents 6 key criteria that you should use when evaluating a potential secrets-scanning solution. Download now to learn more.
-
DevSecOps: A comprehensive guide
By: Contrast Security
Type: eGuide
Read this DevSecOps Buyer’s Guide and get the comprehensive checklist you need to assess, vet, and purchase a DevSecOps platform that delivers accurate, continuous, and integrated security monitoring and remediation.