NSM Reports

CW Innovation Awards: Jio taps machine learning to manage telco network
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this case study, learn how India's largest telecom operator built its own machine learning platform to meet the growing data and signalling requirements of new networks.
Posted: 10 May 2021 | Published: 10 May 2021

TechTarget ComputerWeekly.com

How to enhance your network for the future
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.
Posted: 08 Feb 2021 | Published: 15 Aug 2016

TechTarget ComputerWeekly.com

5G: APAC guide to next-gen mobile connectivity
sponsored by TechTarget ComputerWeekly.com
EGUIDE: From efforts to turn Malaysia's Langkawi island into a 5G testbed to the impact of the coronavirus outbreak on sales of 5G devices, the guide offers a range of perspectives from different stakeholders in APAC's 5G nascent ecosystem.
Posted: 08 Feb 2021 | Published: 20 Apr 2020

TechTarget ComputerWeekly.com

The rise of SD-WANs: Time to cross the chasm
sponsored by TechTarget ComputerWeekly.com
EBOOK: Where does SD-WAN stand at the beginning of the second quarter of 2022? The solid upward trajectory of SD-WANs has been given further impetus by the parallel emergence and rise of SASE, which integrates SD-WAN with edge security, and the rise persists as SD-WAN pricing becomes more competitive and monitoring capabilities become popular.
Posted: 25 Apr 2022 | Published: 25 Apr 2022

TechTarget ComputerWeekly.com

Trend Watch: Advances in Malaysia's digital infrastructure
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at Malaysia's successes and challenges in modernising its infrastructure and other digital transformation initiatives
Posted: 08 Feb 2021 | Published: 16 Apr 2020

TechTarget ComputerWeekly.com

Computer Weekly – 14 June 2022: Managing Apple Macs in the enterprise
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with more people working remotely, the use of Apple Macs in the enterprise is growing – we look at how to manage them securely. Our latest buyer's guide examines security in the supply chain. And 10 years on from the London Olympics, we find out how data innovation is revitalising its legacy. Read the issue now.
Posted: 13 Jun 2022 | Published: 14 Jun 2022

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to edge computing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Edge computing is currently one of the most important trends in IT. It is more likely to complement cloud by supporting workloads that are latency sensitive, require a lot of compute power, or involve large data volumes. In this 15-page buyer's guide, Computer Weekly looks at the potential of harnessing compute power at the edge.
Posted: 08 Feb 2021 | Published: 22 Jan 2020

TechTarget ComputerWeekly.com

A path to smart, not just present, video conferencing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As businesses plan a recovery from the effects of the Covid-19. Employees now expect employers to offer a modern approach to how/where they work. It won't be enough for businesses to get by with aging processes. Wherever staff are based, video conferencing will be pivotal
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

The Ultimate Guide to Enterprise Network Management
sponsored by NBN
WHITE PAPER: Managing enterprise networks is now a greater challenge than ever. Employees are everywhere, so NetOps need to keep a close eye on performance to make sure these employees can stay productive, wherever they are. Access our expert guide to explore best practices and tools for network management, and see how automation can help.
Posted: 08 Feb 2021 | Published: 12 Nov 2020

NBN

Why You Should Consider Endpoint Detection & Response
sponsored by Claranet
EGUIDE: Endpoint security has become an especially hot topic over the past few months. Organizations need to put clamps on hackers who attempt to breach their infrastructure. As such, traditional legacy endpoint security systems may not be able to stand up to modern threats. Read this expert guide to learn about endpoint detection & response.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Claranet