Distributed Processing Reports

Computer Weekly – 17 November 2020: How Mastercard is taking digital payments into a new era
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Mastercard about how the credit card giant is using new technologies to take digital payments into a new era. After months of unprecedented uncertainty, we ask CIOs how they are planning for the next 12 months. And we examine how the growth in remote working will affect IT salaries. Read the issue now.
Posted: 08 Feb 2021 | Published: 17 Nov 2020

TechTarget ComputerWeekly.com

MongoDB Updates Include Swappable Data Storage Engines
sponsored by Rackspace Technology
EGUIDE: In this expert e-guide, discover recent updates to MongoDB that enable organizations to switch storage engines depending on user needs. Additionally, learn about forthcoming updates to MongoDB that will streamline database design and provide better visibility into NoSQL data structures.
Posted: 25 Feb 2016 | Published: 22 Feb 2016

Rackspace Technology

Best Practices for Virtualizing Distributed Environments: Enterprise-Class Virtualization for Remote Office and Branch Office Infrastructures
sponsored by VM6 Software
WHITE PAPER: This whitepaper provides the 4 best practices that IT leaders of ROBO organizations need to consider when virtualizing their businesses, providing ROI tips and establishing a roadmap for reducing the Total Cost of Ownership for virtualizing the distributed ROBO environment.
Posted: 27 Oct 2009 | Published: 27 Oct 2009

VM6 Software

Hardest Problems in Data Management
sponsored by VMware, Inc.
WHITE PAPER: Read this paper to learn how to enable a fast, scalable, fault-tolerant distributed foundation for data management that runs dynamically across the many-machine, many-core, memory-based computing topologies that today's organizations are assembling from existing IT resources and pay-as-you-go clouds.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

VMware, Inc.

The 7 Biggest Mistakes You Can Make in Web Conferences
sponsored by Citrix Online Go To Meeting
WHITE PAPER: In this white paper, unveil the top 7 biggest things to avoid when conducting web conferences so that you can efficiently and effectively lead meetings even when online.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Citrix Online Go To Meeting

The SOA Competitive Landscape Redefined: A Manager's Guide to SOA Platforms
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper describes an approach to evaluating an SOA platform, that is aimed at creating a system based upon a service-oriented application composition and a peer-to-peer distributed infrastructure architecture.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Load Balancing Basics
sponsored by Citrix
WHITE PAPER: Read this white paper to discover a powerful and comprehensive load balancing solution.
Posted: 18 Oct 2007 | Published: 01 Oct 2007

Citrix

Extended Enterprise Poses Identity and Access Management Challenges
sponsored by TechTarget Security
EGUIDE: Inside this SearchSecurity.com e-guide, we explore the disconnect between traditional IAM and the distributed, mobile enterprise to uncover the top three IAM challenges organizations are experiencing today.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

TechTarget Security

Open Source in the Next Computing Wave
sponsored by Red Hat and JBoss
WHITE PAPER: The current economic climate is forcing more systematic thinking about costs in general, including those associated with overall complexity and the security and resiliency of large distributed infrastructures. These trends intersect in powerful ways; a new wave of computing is gathering momentum as a result. And open source is playing a major role.
Posted: 18 Jun 2009 | Published: 09 Jan 2009

Red Hat and JBoss

DDoS Attacks Are On The Rise – And Fatal to Most Businesses
sponsored by Arbor Networks
EGUIDE: This e-guide arms you with the information you need to prepare your defenses for distributed denial of service (DDoS) attacks. Learn how DDoS attacks target your security weak spots, how responses to attacks are improving, and the central challenges surrounding attack prevention.
Posted: 13 Oct 2016 | Published: 11 Oct 2016

Arbor Networks