Caching Appliances Reports

Quicktour Demo: Key Differentiators between Microstrategy and Information Builders
sponsored by MicroStrategy
EGUIDE: This tour provides an overview of MicroStrategy platform's uniquely powerful enterprise business intelligence capabilities and illustrates the 12 key differentiators between MicroStrategy and Information Builders.
Posted: 26 Nov 2008 | Published: 26 Nov 2008

MicroStrategy

Faster PHP Through Java
sponsored by Caucho Technology
WHITE PAPER: Using benchmarks and code samples throughout to anchor the discussion, this paper explores how Quercus - Caucho's Java implementation of PHP - can perform faster than the standard Apache-based PHP both in synthetic benchmarks and real-world applications. The results are quite impressive.
Posted: 18 Mar 2009 | Published: 18 Mar 2009

Caucho Technology

IBM WebSphere eXtreme Scale and WebSphere DataPower XC10 Appliance
sponsored by IBM
WHITE PAPER: Learn how elastic caching solutions in your distributed environment can empower the application performance you need to obtain business agility and thrive against the competition while managing costs.
Posted: 12 Oct 2010 | Published: 20 Jul 2010

IBM

How to ensure web and app performance by addressing the front end
sponsored by Limelight Networks, Inc.
WHITE PAPER: The following white paper explores what companies need to do to ensure the performance of web and mobile applications. Uncover how front end acceleration can help achieve the desired speed, which technologies make this goal a reality, and how to apply the front end acceleration to 3 key areas.
Posted: 11 Apr 2014 | Published: 11 Apr 2014

Limelight Networks, Inc.

Does a proprietary solution automatically mean vendor lock-in?
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: The dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?
Posted: 08 Feb 2021 | Published: 14 Mar 2016

TechTarget ComputerWeekly.com

Computer Weekly – 24 July 2018: Building intelligent aircraft engines with AI and analytics
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Rolls-Royce about using AI, sensors and data analytics to build intelligent aircraft engines. Our latest buyer's guide examines the next generation of desktop IT. And we ask whether a court ruling in Chile could lead to a worldwide change in Oracle's software licensing practices. Read the issue now.
Posted: 08 Feb 2021 | Published: 20 Jul 2018

TechTarget ComputerWeekly.com

CW@50: What was making the news in June
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
Posted: 08 Feb 2021 | Published: 03 Jun 2016

TechTarget ComputerWeekly.com

Top 10 network stories of 2018
sponsored by TechTarget ComputerWeekly.com
EGUIDE: 2018 was the year when software-defined networking, and more specifically software-defined WANs, took centre stage. We look back at a transformative year for the world of the network manager. Here are Computer Weekly's top 10 networking stories of 2018.
Posted: 08 Feb 2021 | Published: 09 Jan 2019

TechTarget ComputerWeekly.com

Beginner's guide to Internet of Things
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The adoption of IoT in Asia-Pacific has accelerated over the past few years, spurred by growing digitalisation across the region and the desire to improve business processes. In this e-guide, learn more about IoT developments across the region and how to leverage the technology to drive business outcomes.
Posted: 15 Feb 2023 | Published: 16 Feb 2023

TechTarget ComputerWeekly.com

Computer Weekly – 8 November 2022: How the US-China chip war will affect IT leaders
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the US ramps up semiconductor sanctions on China, we examine the ramifications across the tech sector. Cyber criminals are turning to new forms of encryption – we talk to the Dutch researchers trying to catch them. And we look at what cloud providers need to do to improve customer experience. Read the issue now.
Posted: 04 Nov 2022 | Published: 08 Nov 2022

TechTarget ComputerWeekly.com