Software Utilities Reports

A case study in critical infrastructure interdependency
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series provides a short introduction to Critical Infrastructure Protection.
Posted: 08 Feb 2021 | Published: 02 Sep 2016

TechTarget ComputerWeekly.com

Chapter 3: SaaS on the Rise, but Does It Deliver?
sponsored by TechTarget Customer Experience
EBOOK: The emergence of Software as a Service-based applications has enabled organizations to get new applications up and running quickly and cheaply, saving resources for mission-critical tasks.
Posted: 07 Oct 2009 | Published: 07 Oct 2009

TechTarget Customer Experience

Building your road map to cloud
sponsored by Hewlett Packard Enterprise
PODCAST: Many organizations understand the core benefits of the cloud, but there remains a level of uncertainty about how to begin to leverage cloud. We help organizations plan their cloud strategy.
Posted: 04 Apr 2011 | Premiered: Apr 4, 2011

Hewlett Packard Enterprise

GPFS Advisory for Sales Engineers
sponsored by IBM
VIDEO: In this video, Scott Fadden of WW Technical Marketing explains what administrators need to know about GPFS, including how it affects storage architectures and the critical management considerations to keep in mind.
Posted: 02 Apr 2015 | Premiered: 02 Apr 2015

IBM

Leveraging Clustered File System Software to Deliver Superior Application Availability
sponsored by Symantec Corporation
WHITE PAPER: Transactional application availability is more important than ever to businesses in a globalized economy. This Vendor Spotlight examines the various architectural approaches to ensuring application uptime and availability, particularly a clustered file system approach with clustered services.
Posted: 28 Dec 2010 | Published: 28 Dec 2010

Symantec Corporation

Effectively Treating the Dreadful Blight of File Bloat
sponsored by Neuxpower
WHITE PAPER: Access this expert paper to learn more about the worst file bloat offenders, the dire consequences of file bloat, file bloat work-arounds, and much more.
Posted: 22 Jun 2010 | Published: 22 Jun 2010

Neuxpower

Demo - Installing Hyper-V Server on Dell PowerEdge R805
sponsored by Dell EMC and Microsoft
SOFTWARE DEMO: This video shows the installation of Hyper-V Server on a Dell PowerEdge R805 server through a Dell Remote Access Card (DRAC) using the Virtual CD-ROM and remote console features to facilitate installation remotely.
Posted: 11 Dec 2008 | Premiered: 11 Dec 2008

Dell EMC and Microsoft

Secure, Reliable, Any-Size File Transfer with FileXpress
sponsored by Attachmate Corporation
WEBCAST: This brief video introduces a secure, reliable, and collaboration-friendly file transfer strategy capable of accommodating multiple platforms, protocols, and standards – keeping costs down and ensuring the safety of your sensitive information all while allowing you to keep up with the pace of business.
Posted: 11 Apr 2013 | Premiered: Feb 20, 2013

Attachmate Corporation

E-Guide: Steps to securing your file transfers and meeting compliance requirements
sponsored by TechTarget Security
EGUIDE: Security has become a main issue with the swift way we have started working, making data transfers less safe. Read this expert E-Guide and learn the steps necessary to secure your managed file transfers and meet compliance requirements.
Posted: 09 Jan 2012 | Published: 09 Jan 2012

TechTarget Security

Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM