ComputerWeekly.com Research Library

Powered by Bitpipe.com

Remote Access Protocols White Papers

  • CW EMEA - May 2023: The future of work

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's CW EMEA, we look at the future of work in Europe after the pandemic forced a change in entrenched human behaviour. We also look at the increasing problem of IT failures in Dutch hospitals and how they are affecting patient care, highlighting the need to improve IT security in hospitals. Read the issue now.

  • Computer Weekly - 28 September 2021: Chancellor Rishi Sunak talks tech

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the Chancellor of the Exchequer about his plans to support innovation and growth in the UK tech sector. Composable IT is the latest trend in building software to support business change. And Halfords built its own service management software – and now is selling it to other retailers. Read the issue now.

  • Secure remote access: More vital than ever thanks to Covid-19

    Sponsored by: TechTarget ComputerWeekly.com

    We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.

  • How virtual desktops simplify end user computing during lockdown

    Sponsored by: TechTarget ComputerWeekly.com

    While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.

  • Computer Weekly – 15 December 2020: How security will be different after Covid-19

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.

  • CW APAC: Expert advice on zero-trust security

    Sponsored by: TechTarget ComputerWeekly.com

    Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.

  • Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.

  • Computer Weekly - 11 August 2020: Freezing digital history in the Arctic Circle

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out why GitHub is storing its historical open source code repositories on analogue film in the Arctic Circle. Our buyer's guide examines modern software development practices. And we hear how VR technology helped the UK build more ventilators to deal with the Covid-19 pandemic. Read the issue now.

  • Optimize Application Performance and Security

    Sponsored by: BlueCoat

    Blue Coat ProxyClient helps deliver a headquarters work experience to all employees wherever they are. With ProxyClient, you can define which applications to accelerate and which to block based on security and bandwidth requirements.

  • Ericom Desktop Virtualization Solutions

    Sponsored by: Ericom Software

    Ericom virtualization solutions enable you to administer virtual desktops from a centralized location, reducing the cost and complexity of virtual desktop deployment and upkeep. Supported virtualization servers include VMware, Microsoft and others.

  • Secure Optimized Data Protection for Remote Offices

    Sponsored by: Symantec Corporation

    Learn how to protect remote office data while simplifying backup and recovery tasks. Be better prepared for and recover more easily from equipment failure, virus attack or accidental loss of vital files.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.