Executives (Software) Reports

Computer Weekly – 29 November 2016: Machine learning keeps customers happy at Ocado
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how data scientists at online grocer Ocado are using machine learning technology to deliver better customer service. Manufacturing giant GE is making a play to become a top 10 software supplier. And we examine the future of server operating systems as workloads move to the cloud. Read the issue now.
Posted: 08 Feb 2021 | Published: 29 Nov 2016

TechTarget ComputerWeekly.com

Updates: The next evolution of operating systems
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we take a look at how operating systems are evolving with the help of continuous updates. Learn about how the Spectre and Meltdown microprocessor flaws have led to improved, more secure processors being released and how Microsoft is evolving its Windows desktop operating system.
Posted: 08 Feb 2021 | Published: 16 Jan 2018

TechTarget ComputerWeekly.com

Jargon Buster Guide to Container Security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.
Posted: 08 Feb 2021 | Published: 19 Feb 2019

TechTarget ComputerWeekly.com

Windows 10: How the client operating system is evolving
sponsored by TechTarget ComputerWeekly.com
EGUIDE: A discussion about strategies for Windows 10 really boils down to the organisation's desktop IT strategy. Windows PCs account for the bulk of the personal computing market and the Windows client remains the dominant target platform for developers of client-side applications. In this e-guide, we look at the evolution of desktop IT.
Posted: 08 Feb 2021 | Published: 26 Nov 2020

TechTarget ComputerWeekly.com

The Scalability Revolution: From Dead End to Open Road
sponsored by GigaSpaces Technologies Inc.
WHITE PAPER: Learn how applications can improve performance and achieve linear scalability by switching from a tier-based model to space-based architecture (SBA).
Posted: 06 Mar 2007 | Published: 01 Feb 2007

GigaSpaces Technologies Inc.

Citrix XenApp 5.0: Preparing for a Successful Migration
sponsored by visionapp
WHITE PAPER: Citrix XenApp 5.0 offers new functionality: with preferential load balancing, preset values can now be applied to both specific users and particular applications.
Posted: 14 Nov 2008 | Published: 14 Nov 2008

visionapp

Oracle Advanced Customer Services: Solution Support Center
sponsored by Oracle Corporation
WEBCAST: The Oracle Solution Support Center, Oracle's most comprehensive Advanced Customer Service, is the best way to protect mission-critical operations and drive business success.
Posted: 18 Feb 2008 | Premiered: Feb 18, 2008

Oracle Corporation

Streamlining Systems Management: Red Hat Provides The University of Southern Mississippi With Time-Saving Solution
sponsored by Red Hat and JBoss
CASE STUDY: Managing close to 80 physical servers with limited technical resources can quickly become a challenge for any organization. learn how USM's IT team turned to Red Hat's 'Satellite' to provide a reliable, advanced, open source systems management solution to ease their systems management challenges.
Posted: 28 Jul 2009 | Published: 28 Jul 2009

Red Hat and JBoss

Agentless Application Virtualization: Enabling the Evolution of the Desktop
sponsored by VMware, Inc.
WHITE PAPER: In this study, IDC analyst Michael Rose discusses how VMware ThinApp, an agentless virtualization solution, addresses the challenges of desktop computing. Read this paper to learn about the pros and cons of virtualized client computing.
Posted: 10 Dec 2008 | Published: 11 Dec 2008

VMware, Inc.

IBM Tivoli Security User Compliance Management Demo
sponsored by IBM
SOFTWARE DEMO: This demonstration shows how Tivoli's security management products work together to provide an audit trail of unauthorized access when an IT administrator logs in to a human resource database containing sensitive information.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008

IBM