WHITE PAPER:
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
CASE STUDY:
In 2011, residential and commercial lighting provider Progress Lighting contracted Rampart Hosting, LLC to develop a mobile application to allow its customers to browse its catalog of products on iPhone, iPad and Android devices. Read this case study to discover the mobile development tools and strategies that Rampart leveraged.
EBOOK:
To celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.
EBOOK:
In this software age, is there any role left for hardware? In our three-part guide, our experts' response is a resounding, "yes." Read now to learn why hardware is still an essential networking choice in terms of scale, reliability, and performance.
WHITE PAPER:
Access this white paper to learn about the economic value of flash compared to hard disks and decide for yourself if flash is worth the investment.
EZINE:
In this week's Computer Weekly, as IT leaders face boardroom pressure to roll out IT projects ever more quickly, we examine how to do that without running unacceptable risks. Michael Dell talks about how he sees the future for his company when it buys EMC. And we hear from IT chiefs about the challenges of implementing DevOps. Read the issue now.
VIRTUAL ENVIRONMENT:
This personal advisor tool from Dell is designed to help you define your unique system configurations in order to find the best hardware solution available for your organization.
WHITE PAPER:
Check out this concise white paper to find out the key features of this blade chassis that will help you construct your IT infrastructure, as well as a complete list of its technical specifications.
EZINE:
In this week's Computer Weekly, as the US ramps up semiconductor sanctions on China, we examine the ramifications across the tech sector. Cyber criminals are turning to new forms of encryption – we talk to the Dutch researchers trying to catch them. And we look at what cloud providers need to do to improve customer experience. Read the issue now.