EZINE:
In this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.
EBOOK:
This e-book, sponsored by Dell, Inc. and AMD, contains a variety of virtualization resources as well as product overviews and videos detailing the features and business benefits of AMD processors and Dell virtualization solutions.
WHITE PAPER:
Learn how the Dual-Core Intel® Itanium® 2 processor 9000 from the Dual-core Intel® Itanium® 2 Processor 9000 Series can deliver new levels of performance, flexibility and value for your data-intensive business and te...
WHITE PAPER:
Oracle introduces the new Sun Fire X4170 M2, the most versatile IT infrastructure building block server and the Sun Fire X4270 M2 server, the ideal server for clustered database and virtualized workloads.
WHITE PAPER:
Learn how SUSE Linux Enterprise Server 10 and Xen virtualization technology enable your data center managers to treat all the hardware and software in the data center as a pool of interchangeable resource components.
WHITE PAPER:
Learn how virtualization can make your infrastructure more efficient. See the different types of virtualization and how IBM technology can help you achieve a virtualized environment.
WHITE PAPER:
This white paper provides an architectural overview and configuration guidelines for deploying Microsoft SQL Server 2005 Business Intelligence and Data Warehouse technologies on Dell PowerEdge servers with Dell PowerVault storage.
EZINE:
According to the Data Center Decisions 2008 Purchasing Intentions Survey, server selection and disaster recovery (DR) are front-burner issues for data center decision makers.
WHITE PAPER:
As part of an effort to address security concerns, Intel IT evaluated Intel® Trusted Execution Technology (Intel® TXT), a new security technology in Intel® processors. Intel TXT is a foundation technology that can be applied to enhance security in multiple usage models. Read this white paper to learn more.