e-Mail Security Hardware Reports

BadUSB 2.0: Exploring USB man-in-the-middle attacks
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
Posted: 08 Feb 2021 | Published: 30 Aug 2016

TechTarget ComputerWeekly.com

Understanding behavioural detection of antivirus
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.
Posted: 08 Feb 2021 | Published: 12 Aug 2016

TechTarget ComputerWeekly.com

Computer Weekly – 16 January 2018: How to fix the Meltdown and Spectre chip flaws
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this week's Computer Weekly, as CIOs come to terms with the Meltdown and Spectre processor flaws that make every computer a security risk, we examine how to protect your IT estate. We find out how Alexa-style smart speakers can help with CRM strategies. And we look at how the public sector is implementing DevOps. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Jan 2018

TechTarget ComputerWeekly.com

How to Start a Windows Vista Pilot Deployment
sponsored by Microsoft
WHITE PAPER: Thinking about deploying Windows Vista? This guide gives an overview of how to successfully manage a pilot program that provides the best experience for pilot users and helps to provide positive project justification to business decision makers.
Posted: 26 Nov 2008 | Published: 26 Nov 2008

Microsoft

Intel Xeon Processor 7300 Series - Visual Demo
sponsored by Intel Corporation
PRODUCT OVERVIEW: Discover how Intel Xeon processor 7300 series offer innovations in data traffic optimization.
Posted: 24 Jul 2008 | Published: 24 Jul 2008

Intel Corporation

Information Security Roles and Responsibilities Made Easy
sponsored by Information Shield, Inc.
SOFTWARE LISTING: Reducing the total cost of information security services by properly documented roles and responsibilities.
Posted: 14 Feb 2008 | Published: 01 Jan 2007

All resources sponsored by Information Shield, Inc.

Red Hat and Intel: Moving Intelligence Forward
sponsored by Red Hat and JBoss
PRODUCT OVERVIEW: Put state-of-the-art intelligence to work on the challenges of tomorrow by running Red Hat Enterprise Linux on the latest Intel® Xeon® processors. Red Hat's open source, commercial-strength innovation delivers optimized results for performance, energy efficiency, and advanced virtualization on Intel platforms, all at an affordable price.
Posted: 19 Jun 2009 | Published: 01 Jun 2009

Red Hat and JBoss

California Institute for Telecommunications and Information Technology (Calit2) Uses Kognitio WX2 for CAMERA Project
sponsored by Kognitio
CASE STUDY: In this case study Calit2 and Cyberinfrastructure for Advanced Marine Microbial Ecology Research and Analysis (CAMERA) develop a cost-effective, high-performance environment where researchers have unlimited access to the existing genomics data.
Posted: 28 Jul 2008 | Published: 25 Jul 2008

Kognitio

E-Guide: Planning and Deploying Server Virtualization
sponsored by Dell and VMware
EGUIDE: In this Pocket Guide, brought to you by SearchServerVirtualization.com, Dell and VMware, discover the central tasks in the assessment and planning stages of a virtualization project.
Posted: 22 Jun 2009 | Published: 22 Jun 2009

Dell and VMware

E-Guide: Which Virtualization Management Tool Is Right For Your Organization?
sponsored by Dell and VMware
EGUIDE: In this informative Pocket Guide, brought to you by SearchServerVirtualization.com, Dell and VMware, learn more about the virtual management tools on the market and their functionality. Discover which product capabilities organizations should consider when evaluating virtual infrastructure management technologies.
Posted: 22 Jun 2009 | Published: 22 Jun 2009

Dell and VMware