Utility Programs Reports

A case study in critical infrastructure interdependency
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series provides a short introduction to Critical Infrastructure Protection.
Posted: 08 Feb 2021 | Published: 02 Sep 2016

TechTarget ComputerWeekly.com

Building your road map to cloud
sponsored by Hewlett Packard Enterprise
PODCAST: Many organizations understand the core benefits of the cloud, but there remains a level of uncertainty about how to begin to leverage cloud. We help organizations plan their cloud strategy.
Posted: 04 Apr 2011 | Premiered: Apr 4, 2011

Hewlett Packard Enterprise

Chapter 3: SaaS on the Rise, but Does It Deliver?
sponsored by TechTarget Customer Experience
EBOOK: The emergence of Software as a Service-based applications has enabled organizations to get new applications up and running quickly and cheaply, saving resources for mission-critical tasks.
Posted: 07 Oct 2009 | Published: 07 Oct 2009

TechTarget Customer Experience

Compression in DB2 Viper
sponsored by IBM Software Group
WHITE PAPER: The DB2 Viper is contributing significant advancements in database compression technology. This white paper compares the leading data server compression utilities and details how to reduce storage costs and improve performance.
Posted: 16 Nov 2006 | Published: 01 May 2006

IBM Software Group

Sharepoint E-zine Vol.3: Using SharePoint's InfoPath feature to generate forms
sponsored by TechTarget Search Windows Server
EZINE: This guide explains planning global enterprise SharePoint deployments, creating custom global search scopes in SharePoint and top tips for harnessing Microsoft SharePoint governance.
Posted: 24 Oct 2008 | Published: 23 Oct 2008

TechTarget Search Windows Server

Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM

E-Guide: Steps to securing your file transfers and meeting compliance requirements
sponsored by TechTarget Security
EGUIDE: Security has become a main issue with the swift way we have started working, making data transfers less safe. Read this expert E-Guide and learn the steps necessary to secure your managed file transfers and meet compliance requirements.
Posted: 09 Jan 2012 | Published: 09 Jan 2012

TechTarget Security

Secure, Reliable, Any-Size File Transfer with FileXpress
sponsored by Attachmate Corporation
WEBCAST: This brief video introduces a secure, reliable, and collaboration-friendly file transfer strategy capable of accommodating multiple platforms, protocols, and standards – keeping costs down and ensuring the safety of your sensitive information all while allowing you to keep up with the pace of business.
Posted: 11 Apr 2013 | Premiered: Feb 20, 2013

Attachmate Corporation

Demo - Installing Hyper-V Server on Dell PowerEdge R805
sponsored by Dell EMC and Microsoft
SOFTWARE DEMO: This video shows the installation of Hyper-V Server on a Dell PowerEdge R805 server through a Dell Remote Access Card (DRAC) using the Virtual CD-ROM and remote console features to facilitate installation remotely.
Posted: 11 Dec 2008 | Premiered: 11 Dec 2008

Dell EMC and Microsoft

Policy-based Compliance Protects Enterprise Imaging and Printing Data
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This exclusive paper examines a policy-based imaging and printing compliance solution that can help your keep the critical data you print safe and secure.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

Hewlett-Packard Enterprise