Microelectronics Industry Reports

Step up Your Game. Global Delivery Capabilities for the Electronics Industry
sponsored by IBM Line of Business
WHITE PAPER: How can your business meet the ever-increasing demands of end users and still make a healthy profit? IBM takes a look at innovation's role in driving business objectives and helping electronics enterprises move forward.
Posted: 17 Jun 2008 | Published: 17 Jun 2008

IBM Line of Business

Cutting Edge Multicore Development Techniques for the Next Wave of Electronics Products
sponsored by IBM
WHITE PAPER: As more and more software is embedded into both consumer and industrial electronics, the electronics industry is being challenged with ensuring rigor within its software development process, often a new core competency, and the integration of hardware and software. Read this paper to learn about solutions that address these complex challenges.
Posted: 01 Sep 2010 | Published: 19 Mar 2010

IBM

Winning the Global Challenge: The Japanese Electronics Companies'Race to Innovate
sponsored by IBM Line of Business
WHITE PAPER: Japanese electronics companies (JEC) are taking bold action to regain market share,profitability and their place as global innovators. Download this IBM Institute for Business Value Study to learn how JECs are transforming their businesses.
Posted: 29 Nov 2007 | Published: 01 Mar 2007

IBM Line of Business

Computer Weekly - 11 May 2021: Chip supply shortages are hitting hard
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, a shortage of semiconductors is affecting industries beyond just IT – we examine the implications. We talk to the CIO of pharmacy chain Boots about how tech helped in being an essential retailer during lockdown. And we look at the prospects for young people entering the IT sector post-pandemic. Read the issue now.
Posted: 10 May 2021 | Published: 11 May 2021

ComputerWeekly.com

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

ComputerWeekly.com

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021

ComputerWeekly.com

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

IBM Bromont Gains Huge ROI Through Smarter Quality Management
sponsored by IBM
CASE STUDY: This use case describes how IBM Bromont's engineering team harnesses the power of analytics to automatically identify failure patterns in CPU modules and instantly determine how serious the problem is, providing them with a 150% ROI in year one alone.
Posted: 25 Feb 2015 | Published: 30 May 2014

IBM

E-Guide: PCI DSS 2011: Key themes to watch
sponsored by SearchSecurity.com
EGUIDE: This expert tip pinpoints key observations and common themes related to what’s currently happening with today’s PCI DSS compliance programs and explains what’s in store for the future as companies transition to the PCI DSS 2.0 guidelines.
Posted: 20 May 2011 | Published: 20 May 2011

SearchSecurity.com

Collaboration capability: The new imperative for empowered information workers
sponsored by SearchContentManagement
EGUIDE: In this e-guide, ebizQ.com Site Editor Anne Stuart takes a multi-faceted look at the use of collaboration and social networking strategies and tools for case management. Gain a big-picture introduction to collaboration and related trends, including insights from several industry thought leaders.
Posted: 21 Nov 2011 | Published: 17 Nov 2011

SearchContentManagement

SearchSoftwareQuality.com Expert Tip Guide: Best practices for embedded software development and CI
sponsored by IBM India Pvt. Ltd
EGUIDE: Read this Tip Guide to discover workable, profitable best practices for embedded software development.
Posted: 25 Jan 2011 | Published: 01 Sep 2011

IBM India Pvt. Ltd

The best way to begin an enterprise information management program
sponsored by SearchDataManagement
EGUIDE: Approaching an enterprise information management (EIM) strategy and ensuring it will provides the best business opportunities for your organization can be a challenge. In this e-guide, readers will learn EIM best practices from Michael Jennings, a data governance director at Walgreens.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

SearchDataManagement

E-Guide: Avoiding Application Security Pitfalls
sponsored by SearchSecurity.com
EGUIDE: This e-guide will explain why people aren’t integrating security with application lifecycle management, the risks businesses take by not taking security measures seriously and what you can do. Read this e-guide to learn why application security measures often fail and what can be done to mitigate them.
Posted: 14 Jan 2011 | Published: 14 Jan 2011

SearchSecurity.com

Big data analytics & innovation in Australian healthcare
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how healthcare providers in Australia and the rest of APAC have successfully tapped the power of data analytics and other related technologies to advance digital health and better position themselves to cope with the growing demand for healthcare.
Posted: 15 Mar 2021 | Published: 16 Mar 2021

ComputerWeekly.com

Creating a Compliance Culture: Best Practices
sponsored by SearchSecurity.com
EGUIDE: Check out this E-Guide and learn key tips on how to make sure your compliance culture is operating efficiently.
Posted: 17 Nov 2011 | Published: 17 Nov 2011

SearchSecurity.com

E-Guide: Database Tools for Auditing and Forensics
sponsored by SearchSecurity.com
EGUIDE: This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

SearchSecurity.com

Great collaboration begins with good governance
sponsored by SearchContentManagement
EGUIDE: For a growing number of companies today, collaboration is no longer a “soft,” nice-to-have concept—it’s an essential component for competitive differentiation. In this Tip Guide, learn how organizations can promote and support effective worker collaboration, and how managers can provide effective governance for collaborative efforts.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

SearchContentManagement

E-Guide: The dangers of application logic attacks
sponsored by SearchSecurity.com
EGUIDE: Developing a secure and effective Web application can be daunting. And, hackers aren't making this task any easier. In this tip from our Ask the Experts section, Web application security expert Michael Cobb explains how hackers use application logic to solicit an attack and advises how to prevent them.
Posted: 14 Apr 2011 | Published: 13 Apr 2011

SearchSecurity.com

Computer Weekly – 21 April 2015: The future of Moore's Law at 50
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, Moore's Law – the seminal forecast by Intel founder Gordon Moore that oversees technology development – is 50 years old. We look at its modern relevance and future implications. IT chiefs discuss whether Windows is still core to their strategy. And we look back at five years of government IT. Read the issue now.
Posted: 17 Apr 2015 | Published: 17 Apr 2015

ComputerWeekly.com

E-Guide: Improving software with the building security in maturity model
sponsored by SearchSecurity.com
EGUIDE: This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time.
Posted: 26 May 2011 | Published: 26 May 2011

SearchSecurity.com

Securing the enterprise application layer: Expert Guidelines
sponsored by SearchSecurity.com
EGUIDE: If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation.  Find out how securing a naming and directory service will help build a solid platform that application can trust.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

SearchSecurity.com

How to create an effective data protection strategy for IT compliance
sponsored by SearchSecurity.com
EGUIDE: Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This tip guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

SearchSecurity.com

E-Guide: Expert insights to application security testing and performance
sponsored by SearchSecurity.com
EGUIDE: Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle.
Posted: 11 Nov 2011 | Published: 11 Nov 2011

SearchSecurity.com

E-Guide: Integrating security into the ALM lifecycle
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, readers will learn the risks businesses take by not taking security measures seriously and what can be done to help integrate security with application lifecycle management.
Posted: 21 Nov 2011 | Published: 16 Nov 2011

SearchSecurity.com

Application security testing: Protecting your application and data
sponsored by SearchSecurity.com
EBOOK: Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.
Posted: 07 Nov 2011 | Published: 07 Nov 2011

SearchSecurity.com

Beating web application security threats
sponsored by SearchSecurity.com
EGUIDE: Application security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that discuss the value of application security and explain how to implement it to ensure the highest availability and usability.
Posted: 14 Nov 2011 | Published: 31 Oct 2011

SearchSecurity.com

Best practices for effective information management
sponsored by SearchDataManagement
EGUIDE: In this expert e-guide take away tips to optimize your business value of successful data management processes, manage the lifecycle of your information and create effective deployments.
Posted: 29 Sep 2011 | Published: 29 Sep 2011

SearchDataManagement

An Introduction to Quantum Lifecycle Management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012

ComputerWeekly.com

Data Protection 101: Essential Steps for Holistic Information Security
sponsored by SearchSecurity.com
EGUIDE: Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This e-guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.
Posted: 17 Nov 2011 | Published: 17 Nov 2011

SearchSecurity.com

MicroScope November 2013: A special issue covering virtualization technology
sponsored by MicroScope
EZINE: A themed issue examining the potential revenue opportunities for resellers that specialize in selling virtualization technology and associated tools.
Posted: 07 Nov 2013 | Published: 07 Nov 2013

MicroScope

Reinvent Your Enterprise Database And Applications
sponsored by NaviSite
WHITE PAPER: AWS offers a powerful home for your legacy and on-prem Oracle deployments as you look to modernize your DB architectures. Explore this e-book to learn the 3 main strategies involved with Oracle migrations, discover how Navisite and AWS can help, and read real-world testimonials from customers who are currently benefiting from this partnership.
Posted: 13 May 2022 | Published: 13 May 2022

TOPICS:  .NET
NaviSite

Will Your IT Budget Scale? Realizing Massive ROI through Data Virtualilzation
sponsored by Delphix
PRESENTATION TRANSCRIPT: This resource provides insight into data virtualization software that has the ability to scale with your budget in order to maximize ROI and efficiency.
Posted: 22 Sep 2011 | Published: 19 Sep 2011

Delphix