Standard Query Languages Reports

A Computer Weekly buyer's guide to asset management for hybrid IT
sponsored by Livingstone Group
EGUIDE: Hybrid IT opens up a range of new considerations for businesses. In this 14-page buyer's guide, Computer Weekly looks at how to manage its infrastructure, the importance of cost management and the main considerations to make when addressing cloud management issues.
Posted: 08 Feb 2021 | Published: 25 Mar 2019

Livingstone Group

The technological evolution of IT industry leaders: Part one
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This first part of this e-guide explores the technological evolution of Oracle, Cisco and Dell throughout the past two decades, including the technologies that have risen to the forefront, from real-time analytics and data management to Cisco's edge computing ambitions.
Posted: 08 Feb 2021 | Published: 26 Feb 2020

TechTarget ComputerWeekly.com

Achieving a High Performance OLTP Database Using SQL Server and Dell PE R720 w/Internal PCIC SSD Storage
sponsored by Dell EMC and Microsoft
WHITE PAPER: Learn how a high-performance OLTP database can catapult your data center's operational efficiency.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Dell EMC and Microsoft

SQL Server DBA Responsibilities & Implications of Integration
sponsored by Microsoft
EGUIDE: "Database management" may sound like one responsibility to the uninitiated, but those who are more familiar know it's just an umbrella term. Read on to explore six duties that are the building blocks of effective SQL Server administration.
Posted: 03 Feb 2016 | Published: 01 Feb 2016

Microsoft

October 2011 SharePoint eZine: The Hidden Costs of SharePoint Server 2010 Implementations
sponsored by TechTarget Content Management
EZINE: In this edition of our quarterly SharePoint e-zine, get expert advice on avoiding surprise expenditures, examples of how customers use ISV products to fill in gaps in SharePoint functionality, and tips to ensure proper staffing so the enterprise gets a ROI.
Posted: 01 Nov 2011 | Published: 01 Nov 2011

TechTarget Content Management

Contextual Authentication: A Multi-factor Approach
sponsored by PortalGuard
WHITE PAPER: This informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.
Posted: 17 Aug 2012 | Published: 17 Aug 2012

PortalGuard

Cisco UCS Ecosystem for Oracle: Extend Support to Big Data and Oracle NoSQL Database
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read this white paper to gain a detailed understanding of how Cisco and Oracle have collaborated to deliver integrated, enterprise-class NoSQL solutions that offer exceptional agility, availability, scalability and manageability. Learn how it provides the infrastructure for the quick deployment of scalable and effective big-data solutions.
Posted: 28 Feb 2012 | Published: 28 Feb 2012

Cisco Systems, Inc.

Business Intelligence - NoSQL, No Problem
sponsored by MongoDB, Inc.
WHITE PAPER: Big data is complex term to define and it often presents obstacles for businesses. Consult this resource to learn more about how you should look at big data from a business perspective. Find out how big data has changed the way that the business intelligence (BI) landscape operates.
Posted: 16 Apr 2013 | Published: 16 Apr 2013

MongoDB, Inc.

SQL Server 2012 Security
sponsored by Microsoft
WEBCAST: Check out this essential webcast to learn all about the security & compliance features for SQL Server from Il-Sung Lee, Senior Program Manager from SQL Server Engine Security team.
Posted: 03 Jan 2012 | Premiered: Jan 3, 2012

Microsoft

E-Guide: Writing secure SQL database code
sponsored by IBM
EGUIDE: When developing and deploying a database, organizations should never rely solely on their developers to provide security. This expert e-guide offers tips for writing secure SQL database code to ensure you build appropriate security controls for the specific features and functionality you need.
Posted: 26 May 2011 | Published: 26 May 2011

IBM