Virtual Data Center E-Zine Issue 2
sponsored by VMware, Inc.
EZINE:
Read this second issue of the Virtual Data Center E-Zine to learn strategies for taking on two of biggest virtualization challenges: I/O bottlenecks and email system virtualization.
Posted: 14 Jan 2009 | Published: 14 Jan 2009
|
|
|
Vista SP1: What You Need to Know before You Deploy
sponsored by Global Knowledge
WHITE PAPER:
The release of Windows Vista SP1 enables customers to take advantage of improvements that Microsoft and its partners have developed. It's a continuation of Microsoft and its partners' drive to provide the best experience possible.
Posted: 10 Dec 2008 | Published: 10 Dec 2008
|
|
|
Virtual Data Center eZine - Volume 2
sponsored by Virtual Data Center eZine - Volume 2
EDITORIAL RESOURCE GUIDE:
Read this second issue of the Virtual Data Center E-Zine to learn strategies for taking on two of biggest virtualization challenges: I/O bottlenecks and email system virtualization.
Posted: 19 May 2008 | Published: 01 May 2008
|
|
|
Tuning Hadoop on Dell PowerEdge Servers
sponsored by Dell, Inc. and Intel®
WHITE PAPER:
This comprehensive resource describes how to tune BIOS, OS, file system, and Hadoop settings to increase performance in Hadoop workloads.
Posted: 23 Jan 2014 | Published: 31 Dec 2013
|
|
|
Setting standards in IT Industries
sponsored by DLT Solutions
EGUIDE:
Building and adhering to security standards are essential for mitigating risk and ensuring adequate IT security. NIST is one of the first risk assessment standards, offering guidelines for securing the IT infrastructure. In this e-guide, gain an in-depth look into NIST and uncover how to decrease the risks that your industry faces.
Posted: 19 Mar 2012 | Published: 16 Mar 2012
|
|
|
Computer Weekly - 19 November 2019: Is facial recognition happening too fast?
sponsored by ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.
Posted: 15 Nov 2019 | Published: 19 Nov 2019
|
|
|
Secure Coding Practices: Use Software Composition Analysis
sponsored by WhiteHat Security
WEBCAST:
Software composition analysis (SCA) is now a necessary process in application development. Why? Because only 10% of code is written end-to-end by an organization’s developers. Let’s say that another way: applications are built with 90% borrowed code. Watch this webinar to understand and compare your security options.
Posted: 09 Jan 2020 | Premiered: Jan 9, 2020
|
|
|
Your Guide to Low-Code PaaS App Development
sponsored by ServiceNow
WHITE PAPER:
Learn about a low-code PaaS app development offering designed for building apps quickly for ITSM, security operations, customer service, and beyond.
Posted: 01 Mar 2018 | Published: 01 Mar 2018
|
|
|
Gamma International: The Macedonia files
sponsored by ComputerWeekly.com
RESOURCE:
This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 23 Nov 2017 | Published: 23 Nov 2017
|
|
|
Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER:
Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.
Posted: 02 Feb 2018 | Published: 02 Feb 2018
|
|
|
|
|