EGUIDE:
During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
EGUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
EGUIDE:
The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
ESSENTIAL GUIDE:
Cyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
EBOOK:
The National Museum of Computing has again been looking into Computer Weekly's 50 years of magazine issues for another selection of articles highlighting significant news published in the month of July over the past five decades.
WHITE PAPER:
Upgrades help businesses to maintain a competitive edge in the market. Yet, upgrades pose their own set of challenges. This white paper lists the best practices that should be followed when upgrading to achieve maximum reliability.
PRODUCT OVERVIEW:
Put state-of-the-art intelligence to work on the challenges of tomorrow by running Red Hat Enterprise Linux on the latest Intel® Xeon® processors. Red Hat's open source, commercial-strength innovation delivers optimized results for performance, energy efficiency, and advanced virtualization on Intel platforms, all at an affordable price.
WHITE PAPER:
This paper provides the data needed to understand the options and the limitations for implementing remote replication solutions on a clustered HP server and storage area network (SAN)-based storage infrastructure.