Disk Operating System Reports

Distributed Object Store Principles of Operation: The Case for Intelligent Storage
sponsored by Hitachi Vantara
WHITE PAPER: This resource explores the growth of distributed object stores (DOS) and examines the underlying mechanisms that guide their use and development.
Posted: 16 Feb 2012 | Published: 16 Feb 2012

Hitachi Vantara

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by TechTarget Security
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

TechTarget Security

Threat Analysis: Understanding and Combating DDoS Attacks
sponsored by Dell SecureWorks
WHITE PAPER: This analysis focuses on the types of attacks generally referred to as distributed denial-of-service, or DDoS, attacks. DDoS attacks are most often used to extort or damage businesses whose websites or online assets are a major source of revenue, are an indicator of brand value, or are critical to operations.
Posted: 31 May 2011 | Published: 31 May 2011

Dell SecureWorks

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Computer Weekly - 3 August 2021: The fears and benefits of virtualising reality
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the mingling of virtual and physical worlds and find positive applications and worrisome implications from augmented reality. We find out how to run a virtual hackathon during the pandemic – pizza still included. And we look at how to improve performance of your private cloud. Read the issue now.
Posted: 01 Aug 2021 | Published: 03 Aug 2021

TechTarget ComputerWeekly.com

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TechTarget ComputerWeekly.com

Computer Weekly - 20 December 2022: The Post Office IT scandal - cock-up or cover-up?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the Post Office IT scandal inquiry continues to reveal shocking details – we review the latest evidence. We examine progress of the roll-out of fast broadband across the UK. And as the Online Safety Bill returns to Parliament, we look at the arguments about how to keep the internet safe. Read the issue now.
Posted: 16 Dec 2022 | Published: 20 Dec 2022

TechTarget ComputerWeekly.com

Computer Weekly – 14 November 2023: The UK AI Safety Summit – what did it achieve?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look back at the UK government's AI Safety Summit and assess what it achieved – and what it didn't. Our latest buyer's guide examines the future of business software and modernising legacy applications. And we find out how the UK PSTI Act aims to protect your smart devices. Read the issue now.
Posted: 10 Nov 2023 | Published: 14 Nov 2023

TechTarget ComputerWeekly.com

Computer Weekly – 28 February 2023: The race to net zero
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the role of green tech in helping businesses contribute to the government's 2050 net-zero targets. We also talk to Spotify about the importance of open source for the music streaming service and how hybrid working is evolving as the post-pandemic workplace continues to change. Read the issue now.
Posted: 27 Feb 2023 | Published: 28 Feb 2023

TechTarget ComputerWeekly.com

The Ultimate Guide to Enterprise Content Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Enterprise Content Management (ECM) has rapidly evolved as different forms of content have been introduced to the work environment. In this guide, find out how ECM works, why it is so important, the key components and benefits, and what to look for when choosing ECM software.
Posted: 05 Oct 2022 | Published: 05 Oct 2022

TechTarget ComputerWeekly.com