TCP/IP Offload Engine Network Interface Cards Reports

Computer Weekly 50th anniversary special
sponsored by TechTarget ComputerWeekly.com
EZINE: It's been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time.
Posted: 08 Feb 2021 | Published: 22 Sep 2016

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to video conferencing and collaboration
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this 17-page buyer's guide, Computer Weekly looks at how employers can support a future of flexible working, with video conferencing, collaboration, augmented reality and unified comms technologies all lined up to play a part.
Posted: 15 Mar 2021 | Published: 01 Mar 2021

TechTarget ComputerWeekly.com

Top 10 networking stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Until Tuesday 10 December, it would have been absolutely fair to say that 2019 was the year of software-defined networking. And then, on 11 December, Cisco unveiled the basis of what it called the internet for the future. Hardware was very much back to the future. Here are Computer Weekly's top 10 networking stories of 2019.
Posted: 08 Feb 2021 | Published: 03 Jan 2020

TechTarget ComputerWeekly.com

IT Priorities 2021 - European Topics Infographic
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This year, a survey was conducted quizzing nearly 500 European IT sector professionals to gather what topics they identified as being imperative for 2021. In this infographic see whether remote working is here to stay, if there will be shifts in information management trends and what infrastructure tools will be deployed by most in 2021.
Posted: 08 Feb 2021 | Published: 14 Dec 2020

TechTarget ComputerWeekly.com

Small Business Firewall Software Vs. Hardware Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small business firewall software and hardware firewalls are the methods used to protect computers against hacker attacks and other Internet threats.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Cisco Systems, Inc.

IT Briefing - Desktop and Application Virtualization: Getting Started
sponsored by Citrix
PRESENTATION TRANSCRIPT: In this document Barb Goldworm, President, Founder and Chief Analyst of Focus, explains the benefits for desktop and application virtualization.
Posted: 03 Feb 2009 | Published: 30 Jan 2009

Citrix

NetBackup Disk Based Data Protection Options
sponsored by Symantec Corporation
WHITE PAPER: This paper explains the disk options and their capabilities as well as the other new features in NetBackup 6.5 that make up the Enterprise Disk Foundation, also it provides guidance in choosing the appropriate disk options for your environment.
Posted: 03 Jun 2008 | Published: 01 Oct 2007

Symantec Corporation

High Availability for SQL Server 2005 Using array-based Replication and Host-based Mirroring Technologies
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This paper provides the data needed to understand the options and the limitations for implementing remote replication solutions on a clustered HP server and storage area network (SAN)-based storage infrastructure.
Posted: 12 Mar 2008 | Published: 01 Jan 2008

Hewlett Packard Enterprise

E-Guide: Which Virtualization Management Tool Is Right For Your Organization?
sponsored by Dell and VMware
EGUIDE: In this informative Pocket Guide, brought to you by SearchServerVirtualization.com, Dell and VMware, learn more about the virtual management tools on the market and their functionality. Discover which product capabilities organizations should consider when evaluating virtual infrastructure management technologies.
Posted: 22 Jun 2009 | Published: 22 Jun 2009

Dell and VMware

System Recovery-Breaking through the Dissimilar Hardware Restore Challenge
sponsored by Symantec Corporation
WHITE PAPER: This paper discusses how Symantec Backup Exec System Recovery Restore Anyware can dramatically change the way organizations perform a wide range of IT tasks, including bare-metal system recovery and restoration to dissimilar hardware.
Posted: 20 Mar 2008 | Published: 01 Dec 2007

Symantec Corporation