Antenna Reports

Does a proprietary solution automatically mean vendor lock-in?
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: The dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?
Posted: 08 Feb 2021 | Published: 14 Mar 2016

TechTarget ComputerWeekly.com

Computer Weekly – 16 January 2018: How to fix the Meltdown and Spectre chip flaws
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this week's Computer Weekly, as CIOs come to terms with the Meltdown and Spectre processor flaws that make every computer a security risk, we examine how to protect your IT estate. We find out how Alexa-style smart speakers can help with CRM strategies. And we look at how the public sector is implementing DevOps. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Jan 2018

TechTarget ComputerWeekly.com

Computer Weekly – 24 July 2018: Building intelligent aircraft engines with AI and analytics
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Rolls-Royce about using AI, sensors and data analytics to build intelligent aircraft engines. Our latest buyer's guide examines the next generation of desktop IT. And we ask whether a court ruling in Chile could lead to a worldwide change in Oracle's software licensing practices. Read the issue now.
Posted: 08 Feb 2021 | Published: 20 Jul 2018

TechTarget ComputerWeekly.com

Virtualization Overview
sponsored by Global Knowledge
WHITE PAPER: This paper explains an approach to virtualization software that relies on the host operating system to provide the service to talk directly to the underlying hardware.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

NetBackup Disk Based Data Protection Options
sponsored by Symantec Corporation
WHITE PAPER: This paper explains the disk options and their capabilities as well as the other new features in NetBackup 6.5 that make up the Enterprise Disk Foundation, also it provides guidance in choosing the appropriate disk options for your environment.
Posted: 03 Jun 2008 | Published: 01 Oct 2007

Symantec Corporation

Dell PowerVault MD3000 3000 Mailbox Single Copy Cluster Microsoft Exchange 2007 Storage Solution
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper describes a tested and validated storage solution for a 3000 mailbox Exchange 2007 environment with Single Copy Cluster in a high availability clustering mechanism based on the Microsoft Cluster Service shared storage.
Posted: 27 Aug 2008 | Published: 27 Aug 2008

DellEMC and Intel®

Small Business Firewall Software Vs. Hardware Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small business firewall software and hardware firewalls are the methods used to protect computers against hacker attacks and other Internet threats.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Cisco Systems, Inc.

Presentation Transcript: How to Cut Your Primary Storage Costs in Half
sponsored by Ocarina Networks
PRESENTATION TRANSCRIPT: In this paper Marc Staimer presents one of the biggest issues decision makers tasked with managing storage budgets that aren't growing at the same rate as their data.
Posted: 11 Feb 2009 | Published: 11 Feb 2009

Ocarina Networks

First the Tick, Now the Tock: Next Generation Intel Microarchitecture - Nehalem
sponsored by Intel Corporation
WHITE PAPER: Read this paper and get a look at how the next generation microarchitecture's dynamically scalable and design-scalable features directly contribute to power efficiency and performance.
Posted: 03 Apr 2009 | Published: 02 Apr 2009

Intel Corporation

System Recovery-Breaking through the Dissimilar Hardware Restore Challenge
sponsored by Symantec Corporation
WHITE PAPER: This paper discusses how Symantec Backup Exec System Recovery Restore Anyware can dramatically change the way organizations perform a wide range of IT tasks, including bare-metal system recovery and restoration to dissimilar hardware.
Posted: 20 Mar 2008 | Published: 01 Dec 2007

Symantec Corporation