Understanding behavioural detection of antivirus
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.
Posted: 08 Feb 2021 | Published: 12 Aug 2016
|
|
|
Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.
Posted: 08 Feb 2021 | Published: 21 Sep 2020
|
|
|
July ezine: Getting storage right
sponsored by MicroScope
EZINE:
An issue looking at what products are in demand now in the storage world and what technologies are coming that need to be embraced by the channel.
Posted: 08 Feb 2021 | Published: 29 Jun 2018
|
|
|
RSA Conference 2020 guide: Highlighting security's human element
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.
Posted: 08 Feb 2021 | Published: 04 May 2020
|
|
|
CW EMEA: Investing in the future
sponsored by TechTarget ComputerWeekly.com
EZINE:
There is a lot of uncertainty in the world right now, and businesses might be forgiven for taking a cautious approach to their planning. But one thing is certain, and that is that oil-rich countries in the Middle East will continue to invest heavily in diversifying their economies.
Posted: 23 Jan 2024 | Published: 23 Jan 2024
|
|
|
Virtualizing the Client PC: A Proof of Concept
sponsored by Intel Corporation
WHITE PAPER:
In this paper Intel IT explores a proof of concept study that examined the viability of abstracting the client operating system from the hardware platform using virtualization.
Posted: 21 Nov 2008 | Published: 21 Nov 2008
|
|
|
Products of the Year 2006
sponsored by Information Security Magazine
JOURNAL ARTICLE:
As spyware becomes increasingly prevalent, antispyware tools are becoming more a necessity than a luxury.
Posted: 10 Aug 2006 | Published: 01 Feb 2006
|
|
|
Best Practices for a Successful Upgrade Project
sponsored by HCL Software
WHITE PAPER:
Upgrades help businesses to maintain a competitive edge in the market. Yet, upgrades pose their own set of challenges. This white paper lists the best practices that should be followed when upgrading to achieve maximum reliability.
Posted: 10 Jul 2008 | Published: 16 May 2008
|
|
|
Information Security Roles and Responsibilities Made Easy
sponsored by Information Shield, Inc.
SOFTWARE LISTING:
Reducing the total cost of information security services by properly documented roles and responsibilities.
Posted: 14 Feb 2008 | Published: 01 Jan 2007
|
All resources sponsored by Information Shield, Inc.
|
|
California Institute for Telecommunications and Information Technology (Calit2) Uses Kognitio WX2 for CAMERA Project
sponsored by Kognitio
CASE STUDY:
In this case study Calit2 and Cyberinfrastructure for Advanced Marine Microbial Ecology Research and Analysis (CAMERA) develop a cost-effective, high-performance environment where researchers have unlimited access to the existing genomics data.
Posted: 28 Jul 2008 | Published: 25 Jul 2008
|
|