Terminal Emulators Reports

CW EMEA - January 2023: Protecting the privacy of schoolchildren
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.
Posted: 11 Jan 2023 | Published: 12 Jan 2023

TechTarget ComputerWeekly.com

Serverless computing: What enterprises need to know
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As the use of public cloud services has gathered steam within enterprises, so too has interest among IT leaders about embracing the principles of serverless computing. In this e-guide we take a closer look at the benefits and pitfalls of serverless, while shining a light on the ways that enterprises across the globe are putting it to use.
Posted: 08 Feb 2021 | Published: 14 Dec 2020

TechTarget ComputerWeekly.com

Computer Weekly – 12 November 2024: Innovating with weather data at the Met Office
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the Met Office is using its vast stores of weather data to create innovative new products. Our latest buyer's guide looks into identity and access management systems. And we examine the geopolitical threats that could curb the openness of open source. Read the issue now.
Posted: 11 Nov 2024 | Published: 12 Nov 2024

TechTarget ComputerWeekly.com

Secure Voting
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 08 Feb 2021 | Published: 04 Apr 2016

TechTarget ComputerWeekly.com

Does a proprietary solution automatically mean vendor lock-in?
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: The dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?
Posted: 08 Feb 2021 | Published: 14 Mar 2016

TechTarget ComputerWeekly.com

Computer Weekly – 17 September 2024: The pillars of AI strategy
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the CIO of Currys about the electronics retailer's AI strategy. We examine how China has become a leader in open source software – and what it means for the rest of the world. And we look at how AI is supporting networking alongside how to implement networking to support AI. Read the issue now.
Posted: 16 Sep 2024 | Published: 17 Sep 2024

TechTarget ComputerWeekly.com

eGuide: Performance tuning SQL Server via queries, indexes and more
sponsored by Microsoft
EGUIDE: In this E-Guide, brought to you by SearchSQLServer.com and Microsoft, learn how to improve query performance, troubleshoot memory configurations, design optimal indexes, utilize database storage methods and solve common SQL errors. This collection of tips and expert guidance will have your SQL Server environment running at peak performance.
Posted: 07 Apr 2009 | Published: 07 Apr 2009

Microsoft

Performance Center of Excellence
sponsored by Hewlett Packard Enterprise
WHITE PAPER: As the application lifecycle evolves, components that drive efficiency and quality become more crucial. Organizations building centers of excellence (CoE) around performance testing find that the CoE centralizes resources and utilizes the full capabilities of today's robust automation products. Read on to learn more about the benefits of CoE.
Posted: 27 Feb 2009 | Published: 27 Feb 2009

Hewlett Packard Enterprise

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.

User Interface Development for Embedded Systems
sponsored by Mentor Graphics
TECHNICAL ARTICLE: An embedded system is a special-purpose system in which the computer is completely encapsulated by or dedicated to the device or system it controls.
Posted: 10 Mar 2009 | Published: 13 Jan 2009

Mentor Graphics