Technical Industries Reports

IT Infrastructure at Your Service: Today’s challenging business climate is driving a move toward delivering IT functions as a service
sponsored by NTT America, Inc.
WHITE PAPER: This white paper examines many of the key considerations organizations must understand and assess before adopting IaaS.
Posted: 13 Jan 2010 | Published: 13 Jan 2010

NTT America, Inc.

Extend your Professional Services Capabilities with IM Virtualization Health Check
sponsored by Ingram Micro
WEBCAST: This webcast covers the importance of having a trusted partner as you work your way through the professional service market. It also features information on a virtual environment health check process.
Posted: 11 Dec 2013 | Premiered: Oct 16, 2013

Ingram Micro

MicroScope – May-June 2024: The challenge of our time
sponsored by MicroScope
EZINE: In this issue, explore what you can do to help customers on their net-zero journeys as sustainability grows in importance in the boardroom. Also read up on the benefits of refurbished kit, and learn how Tech Channel Ambassadors are promoting careers to young people and reskillers
Posted: 02 May 2024 | Published: 03 May 2024

MicroScope

MicroScope – September 2022: The green agenda
sponsored by MicroScope
EZINE: Sustainability is now seen as a necessity for business to have on their agenda, so read about how the channel is turning green to capture customer attention. Also discover how the pandemic has changed sales forever and boosted the importance of relationships, as well as learn about how to handle currency fluctuations, rises and inflation.
Posted: 31 Aug 2022 | Published: 01 Sep 2022

MicroScope

A Computer Weekly buyer’s guide to green tech for business
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Business has a vital role to play in the wider push for sustainability. In this 14-page buyer's guide, Computer Weekly looks at what the private sector can do, how firms can remain competitive while sticking to green targets and digital tech's role in decision-making.
Posted: 04 Apr 2023 | Published: 04 Apr 2023

TechTarget ComputerWeekly.com

Windows Server® 2008 Hyper-V Technology Introduction
sponsored by Dell EMC and Microsoft
DATA SHEET: Dell's Hyper-V Technology Introduction for Windows Server® 2008 is a rapid approach to the deployment and configuration of a Hyper-V and SystemCenter Virtual Machine Manager 2008 (SCVMM) based Proof of Concept (POC) into your pre-production test lab.
Posted: 29 Oct 2009 | Published: 28 Oct 2009

Dell EMC and Microsoft

Scan a Mobile Barcode, Unlock a New Brand Experience: AT&T Mobile Barcode Services
sponsored by AT&T Corp
WHITE PAPER: Turn a static advertisement into an immersive experience with AT&T Mobile Barcode Services. Mobile barcodes give brands the opportunity to reach consumers directly on their smartphones, delivering information, promotions, coupons and more to customers’ fingertips.
Posted: 28 Oct 2011 | Published: 28 Oct 2011

AT&T Corp

A Guide For Consultants Building Composite Financial Applications
sponsored by Xignite, Inc.
WHITE PAPER: This White Paper is for IT Consultants interested in learning how they can make money and grow their business using financial web services to build more unique and creative applications for their clients. It also introduces the Xignite Partner Network.
Posted: 27 Aug 2007 | Published: 01 Aug 2007

Xignite, Inc.

An Introduction to Quantum Lifecycle Management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012

TechTarget ComputerWeekly.com

eGuide:Mitigating malicious advertisement malware
sponsored by TechTarget Security
EGUIDE: More than one million websites were infected by malicious advertisements, also known as malvertisements, in the last quarter of 2010. This expert guide explains why and how this form of attack is quickly spreading and offers technical advice on how to avoid infection.
Posted: 24 Jun 2011 | Published: 24 Jun 2011

TechTarget Security