e-Mail Content Security Hardware Reports

Does a proprietary solution automatically mean vendor lock-in?
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: The dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?
Posted: 08 Feb 2021 | Published: 14 Mar 2016

TechTarget ComputerWeekly.com

Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Cyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
Posted: 08 Feb 2021 | Published: 05 Aug 2016

TechTarget ComputerWeekly.com

CW EMEA: Investing in the future
sponsored by TechTarget ComputerWeekly.com
EZINE: There is a lot of uncertainty in the world right now, and businesses might be forgiven for taking a cautious approach to their planning. But one thing is certain, and that is that oil-rich countries in the Middle East will continue to invest heavily in diversifying their economies.
Posted: 23 Jan 2024 | Published: 23 Jan 2024

TechTarget ComputerWeekly.com

Cyber Security: 2021 Worst in Show
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

TechTarget ComputerWeekly.com

How Retailers Use LTE as Wireless WAN to Improve Service & Operations
sponsored by Cradlepoint
WHITE PAPER: Innovation is changing retail from the storefront to the back office and beyond. Because of this transformation, IT teams and the enterprise networks they manage have never been more important. In this white paper, explore emerging trends in retail IT and considerations for choosing futureproof edge network solutions for retail.
Posted: 08 Feb 2021 | Published: 20 May 2020

Cradlepoint

How to Start a Windows Vista Pilot Deployment
sponsored by Microsoft
WHITE PAPER: Thinking about deploying Windows Vista? This guide gives an overview of how to successfully manage a pilot program that provides the best experience for pilot users and helps to provide positive project justification to business decision makers.
Posted: 26 Nov 2008 | Published: 26 Nov 2008

Microsoft

Going Parallel with LabVIEW Delivers Throughput Gains
sponsored by National Instruments
WHITE PAPER: In this whitepaper learn how by combining technologies with NI Lab VIEW parallel programming software and NI TestStand test management software, test engineers can create high-performance test systems.
Posted: 16 Sep 2008 | Published: 16 Sep 2008

National Instruments

Vizion Core vReplicator
sponsored by Vizioncore Inc.
SOFTWARE LISTING: vReplicator is the recognized host-level image replication solution for VMware Infrastructure. vReplicator allows the entire virtual machine to be replicated, including the OS, configurations and patches, applications and data.
Posted: 14 May 2008 | Published: 01 May 2008

Vizioncore Inc.

California Institute for Telecommunications and Information Technology (Calit2) Uses Kognitio WX2 for CAMERA Project
sponsored by Kognitio
CASE STUDY: In this case study Calit2 and Cyberinfrastructure for Advanced Marine Microbial Ecology Research and Analysis (CAMERA) develop a cost-effective, high-performance environment where researchers have unlimited access to the existing genomics data.
Posted: 28 Jul 2008 | Published: 25 Jul 2008

Kognitio

System Recovery-Breaking through the Dissimilar Hardware Restore Challenge
sponsored by Symantec Corporation
WHITE PAPER: This paper discusses how Symantec Backup Exec System Recovery Restore Anyware can dramatically change the way organizations perform a wide range of IT tasks, including bare-metal system recovery and restoration to dissimilar hardware.
Posted: 20 Mar 2008 | Published: 01 Dec 2007

Symantec Corporation