XenServer Reports

UK IT Priorities 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The results of our 2019 IT Priorities survey are in, and they show the good news that IT budgets are rising faster than they have for many years. Cloud remains the top spending priority for this year, but IT automation is growing fast as a major investment area.
Posted: 08 Feb 2021 | Published: 27 Feb 2019

TechTarget ComputerWeekly.com

Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
Posted: 20 Dec 2021 | Published: 21 Dec 2021

TechTarget ComputerWeekly.com

Enterprise cloud applications – can we trust them?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
Posted: 08 Feb 2021 | Published: 27 Jul 2016

TechTarget ComputerWeekly.com

Computer Weekly – 26 February 2019: Delving into viewer data at the BBC
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the BBC about how the UK broadcaster is using data analytics to better understand its viewers and grow its audience. We look at how CERN is using IT automation in its quest to unravel the mysteries of the universe. And we examine the impact of GDPR on cloud storage. Read the issue now.
Posted: 08 Feb 2021 | Published: 22 Feb 2019

TechTarget ComputerWeekly.com

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TechTarget ComputerWeekly.com

Software licensing – battleground or crucible?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Will software licensing continue to be a battleground for suppliers and users, or can new, mature relationships between the two sides be forged in the digital crucible of contemporary on-demand, pay as you go software?
Posted: 08 Feb 2021 | Published: 17 Aug 2017

TechTarget ComputerWeekly.com

Introduction to Virtualization E-book, Chapter 5: Storage in the Virtualized World
sponsored by Sun Microsystems, Inc.
EBOOK: In Chapter 5 of this E-book, you'll learn how storage virtualization can improve utilization rates, keep resource costs low and boost network performance for real-world and future applications.
Posted: 04 Aug 2009 | Published: 04 Aug 2009

Sun Microsystems, Inc.

Presentation Transcript - Sun Solutions for Boosting Web hosting Efficiency and Optimization
sponsored by Sun Microsystems, Inc. and Intel Corporation
PRESENTATION TRANSCRIPT: Read this transcript featuring industry veteran Greg Schulz for part III of "Business Benefits of Boosting Web hosting" to gain more insight into the benefits and options of boosting web hosting.
Posted: 16 Jun 2009 | Published: 16 Jun 2009

Sun Microsystems, Inc. and Intel Corporation

Virtual Data Center E-Zine - Volume 11
sponsored by Virtual Data Center E-Zine - Volume 11
EZINE: Data center managers face increasing challenges as virtual machines spread across the enterprise. Automation, monitoring and management tools can offer some much needed relief in the battle to keep control in a virtualized environment. In this month's issue of Virtual Data Center, learn how to choose the right virtual tools for the job.
Posted: 05 Jun 2009 | Published: 05 Jun 2009

All resources sponsored by Virtual Data Center E-Zine - Volume 11

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.