Software  >   Systems Software  >  

Basic Input/Output System

RSS Feed   
Basic Input/Output System Reports
 
Setting standards in IT Industries
sponsored by DLT Solutions
EGUIDE: Building and adhering to security standards are essential for mitigating risk and ensuring adequate IT security. NIST is one of the first risk assessment standards, offering guidelines for securing the IT infrastructure. In this e-guide, gain an in-depth look into NIST and uncover how to decrease the risks that your industry faces.
Posted: 19 Mar 2012 | Published: 16 Mar 2012

DLT Solutions

Virtual Data Center eZine - Volume 2
sponsored by Virtual Data Center eZine - Volume 2
EDITORIAL RESOURCE GUIDE: Read this second issue of the Virtual Data Center E-Zine to learn strategies for taking on two of biggest virtualization challenges: I/O bottlenecks and email system virtualization.
Posted: 19 May 2008 | Published: 01 May 2008


Tuning Hadoop on Dell PowerEdge Servers
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This comprehensive resource describes how to tune BIOS, OS, file system, and Hadoop settings to increase performance in Hadoop workloads.
Posted: 23 Jan 2014 | Published: 31 Dec 2013

Dell, Inc. and Intel®

Vista SP1: What You Need to Know before You Deploy
sponsored by Global Knowledge
WHITE PAPER: The release of Windows Vista SP1 enables customers to take advantage of improvements that Microsoft and its partners have developed. It's a continuation of Microsoft and its partners' drive to provide the best experience possible.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Virtual Data Center E-Zine Issue 2
sponsored by VMware, Inc.
EZINE: Read this second issue of the Virtual Data Center E-Zine to learn strategies for taking on two of biggest virtualization challenges: I/O bottlenecks and email system virtualization.
Posted: 14 Jan 2009 | Published: 14 Jan 2009

VMware, Inc.

Computer Weekly – 27 November 2018: Software patching at scale – how to make it work
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at one of the oldest pain points for IT departments – software patching – and ask how to make it less complex across the enterprise. We examine the rise of Kubernetes, the open source container system. And we look at storage strategy to support a multicloud environment. Read the issue now.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

ComputerWeekly.com

Computer Weekly – 21 May 2019: Managing software updates in Windows 10
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how technology is fighting poverty by increasing financial inclusion. We examine how best to manage the challenges of Microsoft's new plan for ongoing Windows 10 updates. And we find out how data innovation at Lloyd's of London is supporting a wider digital modernisation. Read the issue now.
Posted: 19 May 2019 | Published: 21 May 2019

ComputerWeekly.com

CW ASEAN: Unlock flash opportunities
sponsored by ComputerWeekly.com
EZINE: Traditional disks can no longer keep up with the needs of modern enterprises. In this issue of CW ASEAN, we take a look at how enterprises are taking to all-flash array storage, and what they need to do to lay the foundation necessary for getting the most out of the technology. Read the issue now.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

ComputerWeekly.com

API Management: The role of APis in digital business transformation
sponsored by ComputerWeekly.com
EGUIDE: Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

ComputerWeekly.com

Secure Coding Practices: Use Software Composition Analysis
sponsored by WhiteHat Security
WEBCAST: Software composition analysis (SCA) is now a necessary process in application development. Why? Because only 10% of code is written end-to-end by an organization’s developers. Let’s say that another way: applications are built with 90% borrowed code. Watch this webinar to understand and compare your security options.
Posted: 09 Jan 2020 | Premiered: Jan 9, 2020

TOPICS:  Security | Software
WhiteHat Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences