Associative Memory Reports

Guidelines for the Evaluation of Enterprise De-Duplication Solutions: How to Navigate the Pitfalls and Hyperbole
sponsored by IBM
WHITE PAPER: This document is not intended to judge what is good or bad, right or wrong. The primary focus is educational, providing a background on the principles of de-duplication and recommendations to consider in planning an evaluation of de-duplication solutions.
Posted: 01 Apr 2009 | Published: 01 Apr 2009

IBM

CW@50: March editions of Computer Weekly
sponsored by TechTarget ComputerWeekly.com
EZINE: We search back through the Computer Weekly archives held at The National Museum of Computing to present what was happening in IT over the past five decades.
Posted: 08 Feb 2021 | Published: 15 Mar 2016

TechTarget ComputerWeekly.com

Does a proprietary solution automatically mean vendor lock-in?
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: The dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?
Posted: 08 Feb 2021 | Published: 14 Mar 2016

TechTarget ComputerWeekly.com

Computer Weekly – 1 December 2015: Balancing speed and risk in IT projects
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as IT leaders face boardroom pressure to roll out IT projects ever more quickly, we examine how to do that without running unacceptable risks. Michael Dell talks about how he sees the future for his company when it buys EMC. And we hear from IT chiefs about the challenges of implementing DevOps. Read the issue now.
Posted: 30 Nov 2015 | Published: 30 Nov 2015

TechTarget ComputerWeekly.com

Reduce data center complexity when you 'go virtual'
sponsored by HPE and Intel®
WHITE PAPER: Access this exclusive, in-depth resource to find out how HP's latest solution for virtual environments can benefit your organization.
Posted: 04 Mar 2014 | Published: 31 Dec 2013

HPE and Intel®

Modern Infrastructure – October 2016
sponsored by TechTarget Data Center
EZINE: This month's Modern Infrastructure e-zine examines how two abstraction technologies are being used together and how some open source innovators are even latching onto this best-of-both-worlds idea in an effort to better merge containers and VMs.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

TechTarget Data Center

George Crump Evaluates the State of Flash Storage Systems
sponsored by HPE and Intel®
EGUIDE: In this expert guide, George Crump outlines the state of flash storage systems, and demonstrates how to use NVMe and flash DIMM to proactively keep performance ahead of users' expectations. Read on as Crump also predicts the fate of HDDs, and explains how to keep pace by improving internal and external connectivity.
Posted: 21 Jun 2017 | Published: 09 Jun 2017

HPE and Intel®

Computer Weekly – 20 October 2015: IT Giants Dell and EMC Unite
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, Dell's proposed $67bn acquisition of EMC would be the biggest in the history of IT – we assess the implications. £175bn of IT outsourcing contracts come up for renewal in the next three years- what are your options? And we hear from IT leaders about security and the internet of things. Read the issue now.
Posted: 16 Oct 2015 | Published: 16 Oct 2015

TechTarget ComputerWeekly.com

How virtual desktops simply end user computing during lockdown
sponsored by TechTarget ComputerWeekly.com
EGUIDE: While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
sponsored by IBM
WHITE PAPER: This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
Posted: 12 May 2014 | Published: 31 Jan 2014

IBM