Amplifier Reports

Does a proprietary solution automatically mean vendor lock-in?
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: The dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?
Posted: 08 Feb 2021 | Published: 14 Mar 2016

TechTarget ComputerWeekly.com

CW EMEA: Investing in the future
sponsored by TechTarget ComputerWeekly.com
EZINE: There is a lot of uncertainty in the world right now, and businesses might be forgiven for taking a cautious approach to their planning. But one thing is certain, and that is that oil-rich countries in the Middle East will continue to invest heavily in diversifying their economies.
Posted: 23 Jan 2024 | Published: 23 Jan 2024

TechTarget ComputerWeekly.com

Computer Weekly – 21 June 2022: Dreams come true – how data and communication saved a failing company
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the former CEO of bed retailer Dreams explains how digital, data and communication helped turn round a failing company. The UK government has a new digital strategy – but it all seems rather familiar. And we talk to the tech firms trialling a four-day working week. Read the issue now.
Posted: 17 Jun 2022 | Published: 21 Jun 2022

TechTarget ComputerWeekly.com

Increasing Business Performance: Using Virtualization for SAP Applications on IBM System p Servers
sponsored by IBM
WHITE PAPER: This white paper captures the experiences of six large companies running SAP applications using IBM® System p™ virtualization.
Posted: 17 Jun 2008 | Published: 16 Jun 2010

IBM

System Recovery-Breaking through the Dissimilar Hardware Restore Challenge
sponsored by Symantec Corporation
WHITE PAPER: This paper discusses how Symantec Backup Exec System Recovery Restore Anyware can dramatically change the way organizations perform a wide range of IT tasks, including bare-metal system recovery and restoration to dissimilar hardware.
Posted: 20 Mar 2008 | Published: 01 Dec 2007

Symantec Corporation

Best Practices for a Successful Upgrade Project
sponsored by HCL Software
WHITE PAPER: Upgrades help businesses to maintain a competitive edge in the market. Yet, upgrades pose their own set of challenges. This white paper lists the best practices that should be followed when upgrading to achieve maximum reliability.
Posted: 10 Jul 2008 | Published: 16 May 2008

HCL Software

Intel® Xeon® Processor 5500 Series: An Intelligent Approach to IT Challenges
sponsored by Hewlett Packard Company and Intel
WHITE PAPER: As data centers reach the upper limits of their power and cooling capacity, efficiency has become the focus of extending the life of existing data centers and designing new ones. As part of these efforts, IT needs to refresh existing infrastructure with servers that deliver more performance and scalability, more efficiently. Read on to learn more.
Posted: 08 Jul 2009 | Published: 08 Jul 2009

Hewlett Packard Company and Intel

Two Billion Entry Directory Benchmark
sponsored by Oracle Corporation
WHITE PAPER: This benchmark evaluates Oracle Internet Directory performance under scales and throughput rates representative of those encountered in production use in both the communications industry and as part of large scale delivery architectures.
Posted: 10 Apr 2008 | Published: 01 Mar 2008

Oracle Corporation

E-Guide: Which Virtualization Management Tool Is Right For Your Organization?
sponsored by Dell and VMware
EGUIDE: In this informative Pocket Guide, brought to you by SearchServerVirtualization.com, Dell and VMware, learn more about the virtual management tools on the market and their functionality. Discover which product capabilities organizations should consider when evaluating virtual infrastructure management technologies.
Posted: 22 Jun 2009 | Published: 22 Jun 2009

Dell and VMware

Information Security Roles and Responsibilities Made Easy
sponsored by Information Shield, Inc.
SOFTWARE LISTING: Reducing the total cost of information security services by properly documented roles and responsibilities.
Posted: 14 Feb 2008 | Published: 01 Jan 2007

All resources sponsored by Information Shield, Inc.