Basic I/O System Reports

Virtual Data Center eZine - Volume 2
sponsored by Virtual Data Center eZine - Volume 2
EDITORIAL RESOURCE GUIDE: Read this second issue of the Virtual Data Center E-Zine to learn strategies for taking on two of biggest virtualization challenges: I/O bottlenecks and email system virtualization.
Posted: 19 May 2008 | Published: 01 May 2008

All resources sponsored by Virtual Data Center eZine - Volume 2

Setting standards in IT Industries
sponsored by DLT Solutions
EGUIDE: Building and adhering to security standards are essential for mitigating risk and ensuring adequate IT security. NIST is one of the first risk assessment standards, offering guidelines for securing the IT infrastructure. In this e-guide, gain an in-depth look into NIST and uncover how to decrease the risks that your industry faces.
Posted: 19 Mar 2012 | Published: 16 Mar 2012

DLT Solutions

Tuning Hadoop on Dell PowerEdge Servers
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This comprehensive resource describes how to tune BIOS, OS, file system, and Hadoop settings to increase performance in Hadoop workloads.
Posted: 23 Jan 2014 | Published: 31 Dec 2013

Dell, Inc. and Intel®

Vista SP1: What You Need to Know before You Deploy
sponsored by Global Knowledge
WHITE PAPER: The release of Windows Vista SP1 enables customers to take advantage of improvements that Microsoft and its partners have developed. It's a continuation of Microsoft and its partners' drive to provide the best experience possible.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Virtual Data Center E-Zine Issue 2
sponsored by VMware, Inc.
EZINE: Read this second issue of the Virtual Data Center E-Zine to learn strategies for taking on two of biggest virtualization challenges: I/O bottlenecks and email system virtualization.
Posted: 14 Jan 2009 | Published: 14 Jan 2009

VMware, Inc.

Computer Weekly - 20 December 2022: The Post Office IT scandal - cock-up or cover-up?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the Post Office IT scandal inquiry continues to reveal shocking details – we review the latest evidence. We examine progress of the roll-out of fast broadband across the UK. And as the Online Safety Bill returns to Parliament, we look at the arguments about how to keep the internet safe. Read the issue now.
Posted: 16 Dec 2022 | Published: 20 Dec 2022

TechTarget ComputerWeekly.com

CW Benelux November 2020-January 2021: Dutch Alzheimer's app helps dementia patients
sponsored by TechTarget ComputerWeekly.com
EZINE: An app aimed at helping dementia patients and their families has been developed by the Alzheimer Society in the Netherlands and has been welcomed with enthusiasm.
Posted: 08 Feb 2021 | Published: 12 Nov 2020

TechTarget ComputerWeekly.com

Computer Weekly – 27 September 2022: Making digital a key ingredient at Mondelez
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to snack giant Mondelez, the owner of Cadbury, about how AI and data are transforming its business. SAP is increasing support costs for the first time in years – we assess the impact on customers. And a Ukrainian tech CEO tells us how his company kept going despite the Russian invasion. Read the issue now.
Posted: 23 Sep 2022 | Published: 27 Sep 2022

TechTarget ComputerWeekly.com

The Ultimate Guide to Enterprise Content Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Enterprise Content Management (ECM) has rapidly evolved as different forms of content have been introduced to the work environment. In this guide, find out how ECM works, why it is so important, the key components and benefits, and what to look for when choosing ECM software.
Posted: 05 Oct 2022 | Published: 05 Oct 2022

TechTarget ComputerWeekly.com

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TechTarget ComputerWeekly.com