EGUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
EBOOK:
In this week's Computer Weekly, as CIOs come to terms with the Meltdown and Spectre processor flaws that make every computer a security risk, we examine how to protect your IT estate. We find out how Alexa-style smart speakers can help with CRM strategies. And we look at how the public sector is implementing DevOps. Read the issue now.
CASE STUDY:
In this case study Calit2 and Cyberinfrastructure for Advanced Marine Microbial Ecology Research and Analysis (CAMERA) develop a cost-effective, high-performance environment where researchers have unlimited access to the existing genomics data.
WHITE PAPER:
Small business firewall software and hardware firewalls are the methods used to protect computers against hacker attacks and other Internet threats.
WHITE PAPER:
Read this white paper to learn how the new Real Application Testing capabilities in the Oracle Database 11g allows database administrators to adapt to changes easily, lower their testing costs and reduce hardware and software investments.
WHITE PAPER:
In this whitepaper learn how by combining technologies with NI Lab VIEW parallel programming software and NI TestStand test management software, test engineers can create high-performance test systems.
WHITE PAPER:
Intel IT is evaluating solid-state drive (SSD) technology to better understand the benefits to users and the impacts on the enterprise. We have initiated a proof of concept (PoC) study that includes extensive benchmark testing as well as deployment of notebooks with SSDs to the Intel workforce.
WHITE PAPER:
This white paper will discuss HP Data Protector Software which fully supports HP data deduplication technologies allowing you to recover files more quickly while reducing your data management and storage costs.
WHITE PAPER:
This paper explains an approach to virtualization software that relies on the host operating system to provide the service to talk directly to the underlying hardware.