Disk Operating System Reports

Distributed Object Store Principles of Operation: The Case for Intelligent Storage
sponsored by Hitachi Vantara
WHITE PAPER: This resource explores the growth of distributed object stores (DOS) and examines the underlying mechanisms that guide their use and development.
Posted: 16 Feb 2012 | Published: 16 Feb 2012

Hitachi Vantara

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Threat Analysis: Understanding and Combating DDoS Attacks
sponsored by Dell SecureWorks
WHITE PAPER: This analysis focuses on the types of attacks generally referred to as distributed denial-of-service, or DDoS, attacks. DDoS attacks are most often used to extort or damage businesses whose websites or online assets are a major source of revenue, are an indicator of brand value, or are critical to operations.
Posted: 31 May 2011 | Published: 31 May 2011

Dell SecureWorks

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by TechTarget Security
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

TechTarget Security

Computer Weekly - 20 December 2022: The Post Office IT scandal - cock-up or cover-up?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the Post Office IT scandal inquiry continues to reveal shocking details – we review the latest evidence. We examine progress of the roll-out of fast broadband across the UK. And as the Online Safety Bill returns to Parliament, we look at the arguments about how to keep the internet safe. Read the issue now.
Posted: 16 Dec 2022 | Published: 20 Dec 2022

TechTarget ComputerWeekly.com

CW APAC: Trend watch: Enterprise resource planning
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on enterprise resource planning in the Asia-Pacific region, Computer Weekly looks at what's behind this renewed priority and why firms want cheaper software maintenance and the benefits of best-of-breed cloud apps.
Posted: 18 Aug 2022 | Published: 18 Aug 2022

TechTarget ComputerWeekly.com

Royal Holloway: Testing antivirus efficacy in Linux
sponsored by TechTarget ComputerWeekly.com
EZINE: Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

TechTarget ComputerWeekly.com

Windows 10: How the client operating system is evolving
sponsored by TechTarget ComputerWeekly.com
EGUIDE: A discussion about strategies for Windows 10 really boils down to the organisation's desktop IT strategy. Windows PCs account for the bulk of the personal computing market and the Windows client remains the dominant target platform for developers of client-side applications. In this e-guide, we look at the evolution of desktop IT.
Posted: 08 Feb 2021 | Published: 26 Nov 2020

TechTarget ComputerWeekly.com

CW ANZ – Jan 2019: Keeping pace with microservices
sponsored by TechTarget ComputerWeekly.com
EZINE: In this edition of CW ANZ, we look at how enterprises are using microservices to solve problems and the challenges they are facing in moving to this new paradigm in software development. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Jan 2019

TechTarget ComputerWeekly.com

Computer Weekly - 29 November 2022: How to stop data retention from killing the planet
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.
Posted: 28 Nov 2022 | Published: 29 Nov 2022

TechTarget ComputerWeekly.com