MAC Reports

A Computer Weekly eGuide to Workspaces
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this eGuide we focus on all thing's workspace related. We dive into Google's new privacy settings, how the landscape of workspaces will look when the world of work fully returns and Google's new G Suite workspace overhaul.
Posted: 08 Feb 2021 | Published: 21 Dec 2020

TechTarget ComputerWeekly.com

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

A Computer Weekly eGuide to Workspaces
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this eGuide we focus on all thing's workspace related. We dive into Google's new privacy settings, how the landscape of workspaces will look when the world of work fully returns and Google's new G Suite workspace overhaul.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

TechTarget ComputerWeekly.com

Oracle Solaris Operating System: Optimized for Sun x86 Systems in the Enterprise
sponsored by Oracle Corporation
WHITE PAPER: This document is intended as a technical guide for developers and system administrators that want to understand the precise details of how Oracle® Solaris and Oracle’s Sun x86 systems using Intel® Xeon® processor 5600 and 7500 series can improve your enterprise application solution environment.
Posted: 15 Mar 2011 | Published: 01 Jul 2010

Oracle Corporation

Your Guide to Server Virtualization Types
sponsored by Red Hat
EGUIDE: As virtualization begins to play a larger role, trending toward becoming the new norm, it's important that you understand how to move forward. Access this expert e-guide to explore the different types of server memory, virtual machine compatibility, and virtualization file format.
Posted: 03 Feb 2017 | Published: 31 Jan 2017

Red Hat

Virtualization Gets Down to Business as a Wellspring of Agility
sponsored by Dell, Inc. and AMD
EBOOK: This e-book, sponsored by Dell, Inc. and AMD, contains a variety of virtualization resources as well as product overviews and videos detailing the features and business benefits of AMD processors and Dell virtualization solutions.
Posted: 03 Nov 2010 | Published: 13 Sep 2010

Dell, Inc. and AMD

Virtual Data Center E-Zine Volume 33: Time to Consider a Second Hypervisor?
sponsored by TechTarget Data Center
EZINE: This expert e-zine weighs the benefits of deploying a second hypervisor against the risks. Find out what factors you should consider when selecting an additional platform and learn how to improve the performance of your virtual environment.
Posted: 01 Jun 2011 | Published: 01 Jun 2011

TechTarget Data Center

Expert tips for Addressing Power Failure in Your Data Center
sponsored by HPE and Intel®
EGUIDE: The loss of data center power can be critical to any organization. Access this expert e-guide learn why it is important to design your data center with power in mind to prevent capacity issues from happening. Also, gain insight into the reasons for outages and ways to mitigate the risks of potential power path issues
Posted: 24 Jun 2011 | Published: 24 Jun 2011

HPE and Intel®

Virtualizing Business-Critical Applications
sponsored by VMware and Intel
WHITE PAPER: Many IT organizations are interested in virtualizing their business-critical applications but want to be absolutely certain they can deliver the same or better performance, scalability and availability in a virtualized environment. In the vast majority of cases they can. Read this paper to learn about VMware and Intel solutions.
Posted: 28 Sep 2010 | Published: 28 Sep 2010

VMware and Intel

Webroot Secure Anywhere Cloud vs. Six Traditional Security Products
sponsored by OpenText Security Solutions
WHITE PAPER: PassMark Software recently conducted performance testing on eight security software products, on Windows 7 Ultimate Edition. View this white paper to uncover how the software performed in different areas. Each guideline is explained further in the resource.
Posted: 27 Jul 2012 | Published: 24 Jul 2012

OpenText Security Solutions