March 2013 - (Free Research) In this week's Computer Weekly, we look at IBM's work with England's rugby team and Premier League football on how business analytics can improve the chances of winning at sport. We find out the issues to consider when negotiating cloud contracts. And we examine how software-defined networking will automate network management. Read the issue now.
December 2008 - (Free Research) Organizations in all industries and of all sizes are turning to business intelligence (BI) and data warehousing (DW) technologies and services to either automate or support decision-making processes.
November 2011 - (Free Research) In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now.
August 2011 - (Free Research) In this presentation transcript, Paul Pearston, a Senior Security Engineer at Dell SecureWorks, discusses the most serious security threats to mobile devices and recommends specific approaches for securing the mobile organization.
April 2012 - (Free Research) This white paper gives an overview of the challenges release management presents, three tips for improving your software release strategies, and insight on how effective release management is poised to become a driver of competitive advantage.
December 2009 - (Free Research) Read this white paper to learn about the latest partitioning techniques, enhanced scalability, and extended manageability capabilities available in Oracle Database 11g Release 2.
May 2011 - (Free Research) Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
May 2011 - (Free Research) Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
October 2010 - (Free Research) HP Operations Infrastructure Smart Plug-ins 1.6 Evaluation, including Virtualization SPI,provides out-of-thebox functionality, in the form of pre-configured policies with rules and threshold values, for managing all aspects of a virtualized environment. Download your trial now.
August 2010 - (Free Research) Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more.
March 2010 - (Free Research) This report delves into the history of Attivio, which was founded in 2007 by a cadre of former FAST executives, and provides an in-depth look at their product, Active Intelligence Engine (AIE), and its new release.
March 2013 - (Free Research) View this expert e-guide to alleviate your fear of a SQL server migration. It outlines three easy ways to migrate to the latest release of SQL server and demonstrates the pros and cons of using SQL stored procedures. Consult this resource to determine if you should migrate from one method to another.
February 2009 - (Free Research) With the introduction of its EX Series Ethernet Switches, Juniper Networks is advancing the economics of networking, enabling customers to build the high-performance, highly available communication infrastructure they need for non-stop operations, while at the same time lowering capital and operational expenses. Read on to learn more.
August 2009 - (Free Research) Reporting is recognized as a way for companies to improve service, ensure quality, control costs, and prevent losses by empowering decision-makers throughout the organization. This paper will explain why reporting is one form of business intelligence that has become business-critical.
September 2010 - (Free Research) Web application control and data loss prevention are important considerations for future-proofing investments; however, these features are not very mature or widespread. Read on to learn about a critical tool for protecting endpoints from various forms of malware and other security risks.
May 2007 - (Free Research) Read this white paper to learn a structured way to manage requirements, and how risk-based requirements and quality management are inseparable from the larger process of managing the planning, test and release of a software system.
November 2012 - (Free Research) In this week's Computer Weekly, we look at the government's controversial new policy on open standards and what it means for public sector IT. After hurricane Sandy hit New York, we talk to one datacentre operator about how it kept services running. And our latest buyers' guide examines the market for infrastructure on demand. Read the issue now.
April 2012 - (Free Research) This week’s Computer Weekly examines research that suggests CEOs want to invest in IT more than ever, but still see CIOs as technical experts and not business people. We review SQL Server 2012 and ask if Microsoft's database software is catching its competitors as well as concluding our Buyer's Guide to data security.
December 2011 - (Free Research) In this week's Computer Weekly, we examine the economic benefits of plans to release more government data for wider re-use by software developers. We announce the winners of our Social Media Awards, and hear what the IT industry thinks of the new UK cyber security strategy. Download the new issue now.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.