Software  >   Systems Software  >   Programming Languages  >   Markup Languages  >   XML  >  

WML

RSS Feed    Add to Google    Add to My Yahoo!
WML Reports
 
Hardware's Key Role in a Software-Defined Era
sponsored by SearchNetworking.com
EBOOK: In this software age, is there any role left for hardware? In our three-part guide, our experts' response is a resounding, "yes." Read now to learn why hardware is still an essential networking choice in terms of scale, reliability, and performance.
Posted: 16 May 2016 | Published: 16 May 2016

TOPICS:  Hardware | Software
SearchNetworking.com

Computer Weekly Developer Cloud and Mobility Planning Kit
sponsored by Microsoft
EGUIDE: The intersection of two huge technology zones like cloud computing and mobility are bound to be hot, and it can also be challenging for app developers and planners. Computer Weekly, in this development special, has put together four comprehensive pieces of content that are set to help with all your cloud computing and mobility needs.
Posted: 20 Jun 2016 | Published: 20 Jun 2016

Microsoft

Pervasive Monitoring and Security Across Multiple Data Centers
sponsored by Big Switch Networks
CASE STUDY: This case study of a major company was able to reduce the number of tap and tool silos to increase efficiency and security, and economically scale these tools to match the company's global reach, growing cloud, and mobile delivery model.
Posted: 13 Apr 2016 | Published: 28 Dec 2015

Big Switch Networks

Object Storage for a New Generation of IT
sponsored by HGST
WHITE PAPER: This white paper discusses the adoption of object storage solutions that scale to higher capacity levels and provide high levels of resiliency by using erasure coding. Access now to see how this architecture can provide your enterprise with a flexible, scalable, and cost-effective design that will allow you to manage your data effectively.
Posted: 19 Nov 2015 | Published: 31 Oct 2015

HGST

CW@50: March editions of Computer Weekly
sponsored by ComputerWeekly.com
EZINE: We search back through the Computer Weekly archives held at The National Museum of Computing to present what was happening in IT over the past five decades.
Posted: 15 Mar 2016 | Published: 15 Mar 2016

ComputerWeekly.com

Business Management Solutions: Getting it right the first time
sponsored by Sage (UK) Limited
WHITE PAPER: When companies need an ERP solution, they sometimes rush into the selection process without first figuring out exactly what they want to achieve from their implementation, leaving them ultimately disappointed with their purchase decision. Learn how to find a comprehensive business management solution that won't leave you unsatisfied by reading on.
Posted: 22 Dec 2015 | Published: 22 Dec 2015

Sage (UK) Limited

Podcast: Hardware-based Fault Tolerance Versus Software-based Fault Tolerance
sponsored by NEC/INTEL
PODCAST: Find out the differences between hardware- and software- based approaches to fault tolerance (FT) in this expert podcast. Discover a performance comparison of each approach as well as the differences between set up time, virtual machine capacity, network traffic issues, and more.
Posted: 23 Jun 2016 | Premiered: May 25, 2016

NEC/INTEL

Performance Matters: SD-WAN Improves Speed and Reliability
sponsored by Silver Peak
VIDEO: The internet is an incredibly fast way to conduct a great deal of business, but some data needs extra protection. Learn about one way to harness the speeds of the internet for connecting to applications, while remaining secure in the knowledge that your data is safe.
Posted: 22 Jun 2016 | Premiered: 22 Jun 2016

Silver Peak

SOA Design Principles for Dummies
sponsored by IBM
EBOOK: Access this eBook to discover the design principles of SOA, and three fundamental aspects of SOA. Also learn why SOA is simply good design, and how to make your enterprise engaging.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

IBM

The Merry-Go-Round of Security Testing
sponsored by SearchSecurity.com
EBOOK: In this Insider Edition of Information Security, InfoSec pros will learn about the pros and cons of RASP, the runtime application self-protection method for secure software delivery.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
WML White Papers | WML Multimedia | WML IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement