CISC Microprocessors Reports

Computer Weekly – 6 February 2024: Generative AI – an early adopter's experience
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.
Posted: 05 Feb 2024 | Published: 06 Feb 2024

TechTarget ComputerWeekly.com

CW Buyer's Guide: Tablets for business
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this 11-page buyer's guide, Computer Weekly looks at the use of tablets in business and how the effect of mass adoption of tablets in the enterprise could be far more significant than either the desktop or laptop computer.
Posted: 14 Jan 2013 | Published: 14 Jan 2013

TechTarget ComputerWeekly.com

Virtualization Gets Down to Business as a Wellspring of Agility
sponsored by Dell, Inc. and AMD
EBOOK: This e-book, sponsored by Dell, Inc. and AMD, contains a variety of virtualization resources as well as product overviews and videos detailing the features and business benefits of AMD processors and Dell virtualization solutions.
Posted: 13 Sep 2010 | Published: 13 Sep 2010

Dell, Inc. and AMD

HP Integrity NonStop Servers: Standards-based Innovation for the Highest Levels of Service
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this white paper, discover a comprehensive portfolio of servers which deliver flexibility to respond quickly and effectively to changes, with the availability, scalability and cost features that are most appropriate for your business continuity needs.
Posted: 19 Jul 2006 | Published: 01 Jul 2006

Hewlett Packard Enterprise

Presentation Transcript: Virtualize Tier-1 Apps with No Fear
sponsored by Stratus Technologies
PRESENTATION TRANSCRIPT: This transcript of the "Virtualize Tier-1 Apps with No Fear" webcast explains how companies are committing critical workloads to their virtual infrastructures.
Posted: 08 Sep 2010 | Published: 08 Sep 2010

Stratus Technologies

Overview of SAP Solutions on the HP Windows Integrity Platform
sponsored by Hewlett Packard Enterprise
WEBCAST: Attend this Webcast to learn about the advantages of combining SAP and your Windows platform and the steps you can take to ensure a successful upgrade in your organization.
Posted: 06 Dec 2006 | Premiered: Dec 13, 2006, 14:00 EST (19:00 GMT)

Hewlett Packard Enterprise

IBM Systems Solution with SAP Discovery System
sponsored by IBM
WHITE PAPER: Whether you plan to integrate new SAP products into your infrastructure or are preparing for an upgrade, the IBM Systems solution with SAP Discovery system can help you thoroughly evaluate SAP applications - and validate their benefits.
Posted: 19 Jan 2011 | Published: 19 Jan 2011

IBM

Extending the World's Most Popular Processor Architecture
sponsored by Intel Corporation
WHITE PAPER: This paper will provide a brief background on instruction set architecture (ISA) and review new instructions, including SSE4 vectoring compiler and media accelerators, SSE4 efficient accelerated string and text processing, and Application T...
Posted: 26 Jun 2007 | Published: 01 Jan 2006

Intel Corporation

Memory Provisioning Recommendations for Vmware Infrastructure 3
sponsored by Kingston Technology Company, Inc.
WHITE PAPER: In order to successfully base server consolidation on VMware Infrastructure 3, it is important to have appropriately sized physical memory. Learn how to determine the right amount of memory for a VI3 deployment and the consequences of sub-optim...
Posted: 19 Oct 2007 | Published: 19 Oct 2007

Kingston Technology Company, Inc.

Evolution of Integrity Checking with Intel® Trusted Execution Technology: an Intel IT Perspective
sponsored by Intel
WHITE PAPER: As part of an effort to address security concerns, Intel IT evaluated Intel® Trusted Execution Technology (Intel® TXT), a new security technology in Intel® processors. Intel TXT is a foundation technology that can be applied to enhance security in multiple usage models. Read this white paper to learn more.
Posted: 02 May 2011 | Published: 25 Mar 2011

Intel