IC Reports

A Computer Weekly eGuide to Workspaces
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this eGuide we focus on all thing's workspace related. We dive into Google's new privacy settings, how the landscape of workspaces will look when the world of work fully returns and Google's new G Suite workspace overhaul.
Posted: 08 Feb 2021 | Published: 21 Dec 2020

TechTarget ComputerWeekly.com

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

A Computer Weekly eGuide to Workspaces
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this eGuide we focus on all thing's workspace related. We dive into Google's new privacy settings, how the landscape of workspaces will look when the world of work fully returns and Google's new G Suite workspace overhaul.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

TechTarget ComputerWeekly.com

Computer Weekly - 11 May 2021: Chip supply shortages are hitting hard
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, a shortage of semiconductors is affecting industries beyond just IT – we examine the implications. We talk to the CIO of pharmacy chain Boots about how tech helped in being an essential retailer during lockdown. And we look at the prospects for young people entering the IT sector post-pandemic. Read the issue now.
Posted: 10 May 2021 | Published: 11 May 2021

TechTarget ComputerWeekly.com

Defining the datacentre needs of 21st century enterprises
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This guide is designed to provide IT leaders with some insight into how their peers are addressing current problems through the use of cloud and colocation, and shine a light on how the analyst community sees the role of the datacentre changing over time.
Posted: 08 Feb 2021 | Published: 18 Apr 2016

TechTarget ComputerWeekly.com

Virtualization Gets Down to Business as a Wellspring of Agility
sponsored by Dell, Inc. and AMD
EBOOK: This e-book, sponsored by Dell, Inc. and AMD, contains a variety of virtualization resources as well as product overviews and videos detailing the features and business benefits of AMD processors and Dell virtualization solutions.
Posted: 03 Nov 2010 | Published: 13 Sep 2010

Dell, Inc. and AMD

Virtualization Gets Down to Business as a Wellspring of Agility
sponsored by Dell, Inc. and AMD
EBOOK: This e-book, sponsored by Dell, Inc. and AMD, contains a variety of virtualization resources as well as product overviews and videos detailing the features and business benefits of AMD processors and Dell virtualization solutions.
Posted: 13 Sep 2010 | Published: 13 Sep 2010

Dell, Inc. and AMD

Oracle's Sun Fire X4470 Server Architecture: Virtualization Platform for Mission-Critical Applications
sponsored by Oracle Corporation
WHITE PAPER: To support the execution of multiple workloads without starving applications of vital compute resources, a virtualization platform needs to offer high compute performance, a large memory footprint, and superior I/O expansion capabilities. Read on to learn how Oracle’s Sun Fire X4470 server is an ideal mission-critical virtualization platform.
Posted: 16 Mar 2011 | Published: 01 Apr 2010

Oracle Corporation

Red Hat Enterprise Linux has Best Total Cost of Ownership on Red Hat Enterprise Virtualization
sponsored by Red Hat.
WHITE PAPER: A virtualization platform can be very expensive. It's important to consider all costs included in the virtualization process  to ensure a successful virtual environment. Read on to discover how the combination of two Red Hat operating systems will lower your total cost of ownership and increase your infrastructure value
Posted: 19 May 2011 | Published: 19 May 2011

Red Hat.

Keep Cloud Compliant
sponsored by TechTarget Security
EBOOK: Access this expert handbook for key information on how to ensure the move to cloud still meets today's compliance and security guidelines.
Posted: 23 Sep 2013 | Published: 23 Sep 2013

TechTarget Security