Secure remote access: More vital than ever thanks to Covid-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
Posted: 06 May 2021 | Published: 06 May 2021
|
|
|
How virtual desktops simplify end user computing during lockdown
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.
Posted: 15 Mar 2021 | Published: 19 Feb 2021
|
|
|
Intel® Centrino® Duo Processor Technology with Intel® Core™2 Duo Processor
sponsored by Intel Corporation
WHITE PAPER:
This fact sheet details a new technology that provides five times faster wireless performance and two times better range than 802.11 a/g solutions.
Posted: 29 Nov 2013 | Published: 01 Nov 2007
|
|
|
Monitoring the Computer Room's Physical Environment
sponsored by Sensaphone
WHITE PAPER:
This paper addresses the greatest environmental threats to the functionality of small to medium computer rooms and presents the time and cost savings associated with the integration of a remote monitoring system.
Posted: 22 Apr 2008 | Published: 22 Apr 2008
|
|
|
Canadian Airport Reaps the Benefits of Truly Unified Communications
sponsored by Hewlett Packard Enterprise
CASE STUDY:
In this case study learn how Halifax International Airport Authority, one of Canada's largest airports, developed and integrated a unified communications solution that created flexibility and efficiency for how their terminal space is utili...
Posted: 06 Jun 2008 | Published: 01 Feb 2008
|
|
|
Children's Health Associates Reduces IT Costs and Complexities with Ericom's Server Based Computing Solution
sponsored by Ericom Software
CASE STUDY:
See how Children's Health Associates, the largest private pediatric medical practice in the US, found a reliable and safe alternative to a standard Internet terminal system to achieve their IT goals.
Posted: 10 May 2008 | Published: 01 Jan 2007
|
|
|
The Secure Console: Browser-based, Command Line Interface, or Both?
sponsored by Raritan Inc.
WHITE PAPER:
With pros and cons accompanying each approach, IT decision-makers may face a difficult choice in selecting console architecture. Read this white paper to learn benefits and challenges of each as well as the capabilities that differentiate them.
Posted: 18 Jan 2008 | Published: 01 Jan 2004
|
|
|
4 types of server hardware and their pros and cons
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Servers host applications, manage files and perform analytics. Any organization can benefit from the power and versatility that servers provide, but it can be difficult to know which types of server hardware to choose. In this infographic, we take a look into the major types of servers, their advantages and disadvantages.
Posted: 28 Mar 2022 | Published: 28 Mar 2022
|
|
|
Discover the Six Superpowers of Dell PowerEdge Servers
sponsored by Dell Technologies & AMD
EBOOK:
Tomorrow's data centers will be judged by their ability to enable AI and reduce power consumption. Whatever your superpower, Dell PowerEdge servers powered by the latest generation AMD EPYC™ processors are designed to unleash your business' inner hero. Download the eBook to learn more.
Posted: 27 Feb 2025 | Published: 25 Feb 2025
|
|
|
Computer Weekly - 14 December 2021: The rules for a safer internet
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.
Posted: 12 Dec 2021 | Published: 14 Dec 2021
|
|