EZINE:
It's been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time.
EGUIDE:
While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.
EBOOK:
Explore the various options for data center hardware, from choosing a single hardware source to opting to customize through multiple vendors and gain insight on how to approach such decisions and how to think about simplicity vs. flexibility.
EGUIDE:
In this expert guide, George Crump outlines the state of flash storage systems, and demonstrates how to use NVMe and flash DIMM to proactively keep performance ahead of users' expectations. Read on as Crump also predicts the fate of HDDs, and explains how to keep pace by improving internal and external connectivity.
ANALYST REPORT:
Read this Forrester report to examine the case for a faster device refresh cycle, 3 advantages of an accelerated device refresh process (hint: one is security), and 8 benefits realized from a two-year refresh cycle.
EGUIDE:
In this expert e-guide, find out how Facebook not only overcame storing, securing, and delivering large quantities of data to their users but also substantially reduced costs and improved IT efficiency. Learn about the cold storage approach they implemented and determine whether your business could realize the same benefits.
EBOOK:
In this software age, is there any role left for hardware? In our three-part guide, our experts' response is a resounding, "yes." Read now to learn why hardware is still an essential networking choice in terms of scale, reliability, and performance.
EZINE:
In this week's Computer Weekly, as the US ramps up semiconductor sanctions on China, we examine the ramifications across the tech sector. Cyber criminals are turning to new forms of encryption – we talk to the Dutch researchers trying to catch them. And we look at what cloud providers need to do to improve customer experience. Read the issue now.