Parallel Programming Talk - Dr. David Patterson on the future of Parallel Programming
By: Intel Software Network View more from Intel Software Network >>
Download this next:
Why HPC performance requires parallelism
By: HammerSpace
Type: Product Overview
Traditionally ‘HPC’ meant rarefied academic environments and classified government labs, but with the recent explosion of AI and related tools, large clusters are popping up in many enterprise datacenters and public clouds.
NFSv4.2 and pNFS enable anyone to build a high-performance, scalable parallel file system using standard hardware and software components. These standards also contain features designed to enable seamless data mobility which Hammerspace leverages.
In this this product overview, explore the benefits of NFSv4.2 in a Hammerspace Global Data Environment.
These are also closely related to: "Parallel Programming Talk - Dr. David Patterson on the future of Parallel Programming"
-
Seven Wonders of the HPC World
By: Dell Technologies & AMD
Type: eBook
With record performance, businesses are using high performance computing (HPC) to solve the world’s most complex problems, transforming data into insights at lightning-fast speeds and performing a quintillion calculations per second. Is an HPC model a suitable fit for your company’s needs, though? It’s time to find out.
This 11-page e-book demystifies the definition of HPC and the power of supercomputing by illustrating 7 innovative and noteworthy use cases to consider.
Browse your copy to learn how HPC supports the James Webb Space Telescope (JWST), models wildfire behavior, cracks cardiovascular disease—and most importantly, your company.
-
CW Europe - September-November 2021: Dutch researchers build security software to mimic human immune system
By: TechTarget ComputerWeekly.com
Type: Ezine
In this issue of CW Europe, find out how researchers in the Netherlands are attempting to help IT systems fight certain cyber attacks in a similar way to the human immune system works. One of the team at Dutch research institute TNO was originally an immunologist, and saw parallels with the human immune system in the field of cyber security. Also in this issue, find out about the so-called “Klarna academy” in Stockholm, which has created the next set of Nordic fintech entrepreneurs.
Find more content like what you just read:
-
Why WFH workforces now rely on HCI
By: TechTarget
Type: Resource
Hyper-converged technology is still a work-from-home infrastructure staple for serving virtual desktops to remote users, the need for which is now greater than ever. Read our expert guide on The Evolution of HCI Networking to dig further this trend and discover how to tackle any HCI networking challenges that may crop up.
-
Preparing a database strategy for Big Data
By: TechTarget Data Management
Type: eGuide
This e-guide outlines the key database challenges and opportunities introduced by big data, and offers expert advice to help you successfully prepare a big data database strategy.
-
Struggling to find an AI storage option? Here’s one of the fastest choices
By: HammerSpace
Type: Video
Tune in to this short video as HammerSpace unveils one of the fastest file systems in the world for training enterprise AI models at scale.
-
See the future of process monitoring and industrial IoT
By: Reply
Type: Blog
If you haven’t heard of the concept of digital twins (DTWIN), it’s a new way of thinking about and implementing distributed systems capable of controlling and anticipating deviations. This emerging technology is also positioned to become an important element for industrial digital transformation. Read on to learn more about this technology.
-
The MQL is dead: Why & how to focus on buying groups
By: TechTarget
Type: BrightTALK Webinar
In this webcast, Terry Flaherty, VP and Principal Analyst at Forrester, explains what The Beatles’ lyrics reveal about marketing qualified leads (MQLs).
-
The rise of SD-WANs: Time to cross the chasm
By: TechTarget ComputerWeekly.com
Type: eBook
Where does SD-WAN stand at the beginning of the second quarter of 2022? The solid upward trajectory of SD-WANs has been given further impetus by the parallel emergence and rise of SASE, which integrates SD-WAN with edge security, and the rise persists as SD-WAN pricing becomes more competitive and monitoring capabilities become popular.
-
5 CEM tips from Walter White
By: TechTarget Customer Experience
Type: eGuide
Access this expert e-guide to learn more about customer experience management through the experiences of fictional character Walter White from the popular television series "Breaking Bad." Read on to learn how Kimberly Samuelson of Laserfiche, draws parallels between marketing strategies and the illegal drug business.
-
Analysts’ thoughts on SASE: 11-page white paper
By: Cato Networks
Type: White Paper
Why do analysts recommend leveraging SASE? In this white paper, explore 7 reasons why and unlock insights from Gartner, Forrester and more.
-
An expert walkthrough of a Red Hat migration on AWS
By: AWS Red Hat
Type: Video
In this video, you’ll hear from David Duncan, Partner Solutions Architect at AWS, as well as Mayur Shetty, Partner Solutions Architect at Red Hat, about how you can complete a Red Hat CentOS7 to RHEL7 migration on AWS. Tune in to gain expert insights about tools and processes designed to help you enable a successful migration.
-
Accelerating transformation through IT modernization
By: Dell Technologies & Intel
Type: Case Study
Three universities advanced IT for digital transformation. University of Pisa utilized NVMe storage and virtualization for quick data processing. Xavier University improved data protection for swift restores. Aalto University virtualized desktops for remote access to apps. Explore case studies to boost digital transformation in higher education.
-
Network & security predictions for 2024
By: Aruba Networks
Type: Webcast
What changes should network and security professionals expect in 2024? To review top predictions, tune into this webcast, which features two leaders from HPE Aruba Networking: Chief Product Officer, David Hughes, and VP of Industry Strategy, James Robertson.
-
Computer Weekly 26 February 2019: Delving into viewer data at the BBC
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we talk to the BBC about how the UK broadcaster is using data analytics to better understand its viewers and grow its audience. We look at how CERN is using IT automation in its quest to unravel the mysteries of the universe. And we examine the impact of GDPR on cloud storage. Read the issue now.
-
Demystifying Attack Surface Management (ASM)
By: TD Synnex
Type: Podcast
To break down the popular term “attack surface management,” Hector Hernandez, Solution Architect at Logicalis, chats with David Wolpoff, CTO and Co-Founder at Randori, in this episode of Logicalis’s “Tech ChangeMakers Podcast.”
-
Focus: Application Virtualisation
By: TechTarget ComputerWeekly.com
Type: eGuide
This e-guide focuses on application virtualisation and how big companies are finding various ways to stop applications adversely affecting each other.
-
CW Middle East January-March 2020: Digital leads the way at Abu Dhabi oil giant
By: TechTarget ComputerWeekly.com
Type: Ezine
In this issue of CW Middle East, read how the UAE and the Abu Dhabi National Oil Company have recognised that things will change as oil and gas resources dwindle. Digital technology, such as artificial intelligence, has been identified as a key driver for future industries.
-
CW Benelux - May-July 2021: Netherlands university launches centre of expertise in applied AI
By: TechTarget ComputerWeekly.com
Type: Ezine
Amsterdam University of Applied Sciences has launched a centre of expertise in applied artificial intelligence, and students from all faculties of the university will learn how to apply AI in their field of study.
-
Key Insights for B2B Startups from a Pre-Series A VC
By: TechTarget
Type: Webcast
In this episode of “Tech Investors and Operators,” which features the insights of leaders from TechTarget and Companyon Ventures, discover what your organization can learn from focusing your VC on pre-Series A.
-
Riding the elephant: how to manage big data
By: TechTarget ComputerWeekly.com
Type: eGuide
Big data vendors – such as the Hadoop distributors – will say they see signs that big data science projects are giving way to large scale implementations. But how are user organisations managing those? How are they designing their IT organisations, and the rest, to manage and capitalise on big data?
-
CW APAC, Sep 2021: Buyer's guide to robotic process automation
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, Computer Weekly looks at the adoption of robotic process automation in APAC and where the technology fits in the wider automation landscape
-
November ezine: Peer-to-peer lending
By: MicroScope
Type: Ezine
Credit always matters in the channel and peer-to-peer lending might just be the alternative some have been looking for
-
Declaration by David Godkin producing 212 sealed exhibits - 16 May 2018
By: TechTarget ComputerWeekly.com
Type: Resource
The exhibits produced in this declaration by David Godkin, counsel for app developer Six4Three, contain internal Facebook communications, including emails between CEO Mark Zuckerberg and senior executives, correspondence and chat-logs, spreadsheets and strategy presentations.
-
Financial crime compliance: How you should be preparing for the future
By: SAS
Type: eBook
In this e-book, discover how global trends in AML and financial crimes compliance have been evolving due to AI and other emerging technologies in anti-fraud defenses.
-
Artificial Intelligence and Machine Learning in data analytics and business applications
By: TechTarget ComputerWeekly.com
Type: eGuide
Artificial Intelligence and the sub-set of it which is machine learning are hot. It's been impossible to attend an IT conference in the last year or so without encountering a dead human genius reincarnated as a software system or a robot.
-
Computer Weekly datacentre case studies
By: TechTarget ComputerWeekly.com
Type: Case Study
Jim Mortleman takes a look at what made the winning entries stand out from the crowd in the Computer Weekly European User Awards.
-
Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018
By: TechTarget ComputerWeekly.com
Type: Resource
David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.
-
Declaration by David Godkin with 218 exhibits – 17 May 2018
By: TechTarget ComputerWeekly.com
Type: Resource
A declaration by David Godkin, counsel for app developer Six4Three, producing 218 exhibits. The exhibits cover a wide range of material relating to Facebook, including news cuttings, press releases and blog posts. The exhibits present a timeline of what was publicly known and when.
-
The user experience impact of online government services
By: Okta
Type: BrightTALK Webinar
In an attempt to better accommodate customer needs, government entities continue to migrate services online. But what roles does security play in the success of these initiatives? Tune into this webcast to see what experts have to say.
-
Own your data across any cloud
By: Veeam Software
Type: Webcast
92% of businesses operate with hybrid cloud infrastructure. While hybrid cloud delivers a multitude of benefits for business, it also comes with its share of challenges for backup. In this webcast, Veeam hybrid cloud backup experts Sam Nicholls and David Hill discuss key topics surrounding the state of hybrid cloud data. Watch now to learn more.
-
With Oversight, university identifies $460,000 in erroneous expenses
By: Oversight Systems
Type: Case Study
As a major educational institution, Texas A&M University’s financial auditing team encountered challenges due to high transactional volumes and lengthy audit processes. By adopting Oversight’s solution, the
-
University Health San Antonio Uses Mobile App to Increase Patient Engagement
By: Gozio Health
Type: Case Study
Learn how University Health is strengthening patient retention with its mobile app, driving a patient reuse rate of over 70%, and increasing sessions from 100 to 10,000 per day.
-
Beyond the hype: How big data projects are delivering
By: TechTarget ComputerWeekly.com
Type: eGuide
This e-guide collates a group of examples of big data technologies in use, such as how Mercedes-AMG Petronas Motorsport are looking to gain an edge on the competition in the Grand Prix season. Also see how big organisations are managing their big data operations and their data analytics programmes and teams through some high profile case studies.
-
Computer Weekly – 22 August 2023: Can low code/no code ease developer skills shortages?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, with organisations increasingly turning to low-code/no-code tools to enable "citizen developers" among staff – we look at whether this can help to ease software developer skills shortages. Read the issue now.
-
CW Innovation Awards: NUHS taps RPA in Covid-19 swab tests
By: TechTarget ComputerWeekly.com
Type: eGuide
In this case study, learn how Singapore's National University Health System deployed RPA bots to automate patient registration during Covid-19 swab tests as part of broader efforts to improve efficiency.
-
Is Your Anesthesia Program a Partner or an Obstacle?
By: Sound Physicians
Type: Webcast
Unfortunately, many anesthesia programs cause friction and inefficiencies. Properly designed care teams alleviate anesthesia program obstacles and create a collaborative environment that promotes surgeon satisfaction, positive patient experiences, and OR throughput.
-
How to Scale Your IaC Security Program
By: Palo Alto Networks
Type: eBook
If you have to shore up your cloud infrastructure security after you’ve already embedded IaC into your workflows, there are a few common challenges you’ll face—cloud infrastructure drift and misconfigured open source IaC components among them. Overcome these IaC challenges by reading this e-book.
-
Your path to a mature AppSec program
By: Veracode, Inc.
Type: eBook
Due to the sensitive data they contain, applications are often the target of cyberattacks – and unfortunately, application security approaches are rarely equipped to handle today’s threats. Read this e-book to learn how to modernize your application security approach.
-
What a leading cybersecurity program looks like
By: AT&T Cybersecurity
Type: White Paper
In order to overcome obstacles, many leading organizations turn to cybersecurity consultants to provide unbiased, expert advice and to augment their own staff expertise and resources in order to get over plateaus in the growth of their cybersecurity programs. Learn more by downloading this paper today.
-
Cut healthcare supply chain costs by 17% by digitizing SCM
By: Conduit
Type: White Paper
Under traditional supply chain scenarios, physicians have little visibility into the volume and cost of the products and devices they consume. Read this paper to understand how a digitized supply chain creates clearer consumption visibility, supports better patient outcomes, and reduces waste and expense.
-
CW Benelux ezine August 2016
By: TechTarget ComputerWeekly.com
Type: Ezine
In this issue of CW Benelux we describe how data scientists in the Netherlands have applied technology to art.
-
E-Guide: Software-Defined Networking Could Make Network-as-a-Service a Reality
By: TechTarget Security
Type: eGuide
This E-Guide from SearchNetworking.com explores the reality of Network-as-a-Service and how it may be coming soon to a data center near you.
-
Computer Weekly 29 January 2019: A vintage digital transformation for Majestic Wines
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we examine the digital transformation of retailer Majestic Wines and find out how buying rival Naked Wines led to a cloud overhaul of the firm's IT. We look at the challenges for IT managers as they prepare for the end of Windows 7 support. And our buyer's guide discusses deep learning technology. Read the issue now.
-
SAN block access storage in the age of cloud and hyper-converged
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
-
The metaverse explained: Everything you need to know
By: TechTarget ComputerWeekly.com
Type: Infographic
The metaverse is considered to be the next evolution of the internet, and its possibilities are virtually infinite to those who learn how to master this new digital universe. In this infographic, we put together everything you need to know about the metaverse.
-
SAN block access storage in the age of cloud and hyper-converged
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
-
Updating Your Corporate BYOD Program for Success
By: TechTarget Security
Type: eGuide
This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.
-
CX loyalty programs: How to ensure engagement
By: Hinduja Global Solutions
Type: Case Study
Retaining a consistent customer base is something that all businesses can struggle with. This was the case for this prestigious luxury hotel chain, who was challenged with fostering high levels of customer experience, engagement, and satisfaction. Dig into this case study to learn more.
-
How to best measure your marketing programs’ impact
By: BrightTALK by TechTarget
Type: BrightTALK Webinar
Most B2B marketers will agree that sound measurement is crucial when determining the success and ROI of your webinar programs. Today’s demand gen teams have thousands of data points at their fingertips, but pinpointing the right metrics and insights is easier said than done. Watch this webinar to learn more.
-
Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.