Software Utilities Reports

A case study in critical infrastructure interdependency
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series provides a short introduction to Critical Infrastructure Protection.
Posted: 08 Feb 2021 | Published: 02 Sep 2016

TechTarget ComputerWeekly.com

Chapter 3: SaaS on the Rise, but Does It Deliver?
sponsored by TechTarget Customer Experience
EBOOK: The emergence of Software as a Service-based applications has enabled organizations to get new applications up and running quickly and cheaply, saving resources for mission-critical tasks.
Posted: 07 Oct 2009 | Published: 07 Oct 2009

TechTarget Customer Experience

Building your road map to cloud
sponsored by Hewlett Packard Enterprise
PODCAST: Many organizations understand the core benefits of the cloud, but there remains a level of uncertainty about how to begin to leverage cloud. We help organizations plan their cloud strategy.
Posted: 04 Apr 2011 | Premiered: Apr 4, 2011

Hewlett Packard Enterprise

Time to Print
sponsored by MicroScope
EGUIDE: In this e-guide, we discuss the ever-evolving world of print within the digital age. We look at how major print vendors are planning on using the channel to help them grow, how 3D printing is having an impact andwhy cloud-based solutions are increasing.
Posted: 08 Feb 2021 | Published: 22 Feb 2019

MicroScope

Time to Print
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we discuss the ever-evolving world of print within the digital age. We look at how major print vendors are planning on using the channel to help them grow, how 3D printing is having an impact andwhy cloud-based solutions are increasing.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

TechTarget ComputerWeekly.com

FTP-Stream China Data sheet
sponsored by Maytech
DATA SHEET: Find out how FTP-Stream China cracks the file sharing services problem by reading this resource now.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

Maytech

E-Guide: Steps to securing your file transfers and meeting compliance requirements
sponsored by TechTarget Security
EGUIDE: Security has become a main issue with the swift way we have started working, making data transfers less safe. Read this expert E-Guide and learn the steps necessary to secure your managed file transfers and meet compliance requirements.
Posted: 09 Jan 2012 | Published: 09 Jan 2012

TechTarget Security

Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM

A Flexible, High-Performing System for Big Data Analytics
sponsored by IBM
WHITE PAPER: This white paper introduces a big data analytics platform that integrates with Hadoop for more comprehensive analytics with enhanced reliability and scalability.
Posted: 31 Mar 2015 | Published: 31 May 2013

IBM

Optimizing Storage with Global File Virtualization
sponsored by EMC Corporation
WHITE PAPER: Global file virtualization is changing network storage management. Learn about a solution that allows organizations to easily simplify management, increase utilization, resolve performance bottlenecks, leverage tiered storage and lower TCO.
Posted: 03 Sep 2008 | Published: 03 Sep 2008

EMC Corporation