ESSENTIAL GUIDE:
In this 11-page buyer's guide, Computer Weekly looks at the use of tablets in business and how the effect of mass adoption of tablets in the enterprise could be far more significant than either the desktop or laptop computer.
WHITE PAPER:
Citrix and Intel worked together to deliver local virtual machine desktops, aiming to make virtualization ubiquitous on client devices. The result of the collaboration is Citrix® XenClient™, a local desktop virtualization platform that provides new levels of security and user flexibility for enterprise desktops. Continue reading to learn more.
EBOOK:
Server consolidation can save your organization money by increasing utilization rates and reducing power and cooling costs. Learn how capacity planning and virtualization technologies can help you meet your server consolidation goals.
WHITE PAPER:
This brief whitepaper looks at powerful and effective features of a combined hardware and software desktop virtualization platform that provides organizations with an all-in-one VDI strategy for simplified, efficient deployment.
EGUIDE:
This expert glossary in the Virtualization Explained series offers in-depth definitions of popular terms and technologies surrounding virtualization. To maintain relevance, the glossary is continuously updated with the most up-to-date virtualization information.
WHITE PAPER:
Citrix provides a robust set of virtualization technologies to help improve the resilience and usefulness of an organization's information infrastructure, ensuring that not just critical resources remain available but that they are always accessible to all users in any location with any device. Continue reading to learn more.
EZINE:
In this week's Computer Weekly, the Post Office IT scandal inquiry continues to reveal shocking details – we review the latest evidence. We examine progress of the roll-out of fast broadband across the UK. And as the Online Safety Bill returns to Parliament, we look at the arguments about how to keep the internet safe. Read the issue now.
RESEARCH CONTENT:
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
EZINE:
In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.
EGUIDE:
Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.