This investigation by Amnesty International examines human rights abuses in the extraction of cobolt and the extent to which manufacturers have conducted due diligence in sourcing cobolt for mobile phone production.
It's been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time.
Inside this analyst report from IDC, learn more about the threats that face server, processor, and other infrastructure components within today’s data centers – and find out how to start plugging potential holes in your organization’s own hardware security perimeter.
This white paper explores the reference architecture for a leading server solution. Learn how this architecture is designed to influence the benefits of virtualizing the underlying infrastructure and address the common problems associated with hardware sprawl.
Read this informative data sheet from IBM detailing their new server hardware optimized for cloud computing and desktop virtualization and learn how their new servers can cut downtime out of the equation for you and your organization.
In this e-guide, IT security pro Nick Lewis discusses the evolving security threat posed by embedded systems on standard enterprise networks, including some recent printer security vulnerabilities. Learn about potential mitigations you can put in place, and get bonus tips on keeping data safe in recycled PC components.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.