Unzip File Utility Reports

Webroot Secure Anywhere Cloud vs. Six Traditional Security Products
sponsored by OpenText Security Solutions
WHITE PAPER: PassMark Software recently conducted performance testing on eight security software products, on Windows 7 Ultimate Edition. View this white paper to uncover how the software performed in different areas. Each guideline is explained further in the resource.
Posted: 27 Jul 2012 | Published: 24 Jul 2012

OpenText Security Solutions

Effectively Treating the Dreadful Blight of File Bloat
sponsored by Neuxpower
WHITE PAPER: Access this expert paper to learn more about the worst file bloat offenders, the dire consequences of file bloat, file bloat work-arounds, and much more.
Posted: 22 Jun 2010 | Published: 22 Jun 2010

Neuxpower

Compression in DB2 Viper
sponsored by IBM Software Group
WHITE PAPER: The DB2 Viper is contributing significant advancements in database compression technology. This white paper compares the leading data server compression utilities and details how to reduce storage costs and improve performance.
Posted: 16 Nov 2006 | Published: 01 May 2006

IBM Software Group

DB2 9 Unveiled: Overview and New Enhancements
sponsored by IBM Software Group
WHITE PAPER: IBM DB2 9 (previously codenamed 'Viper') for Linux, UNIX, and Windows marks a new stage in the evolution of data servers. This IBM white paper introduces and details many of DB2 9's innovative features and capabilities.
Posted: 16 Nov 2006 | Published: 01 Jul 2006

IBM Software Group

Computer Weekly – 19 September 2017: Can DevOps deliver on its productivity promises?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, DevOps is cited as a key element of digital transformation – we examine the challenges to delivering on its promise. Many retailers are investing in emerging technologies to gain an edge – but are they too far ahead of the curve? And could a new spirit of collaboration help UK broadband roll-out? Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Sep 2017

TechTarget ComputerWeekly.com

Gamma International: The Macedonia files
sponsored by TechTarget ComputerWeekly.com
RESOURCE: This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 08 Feb 2021 | Published: 23 Nov 2017

TechTarget ComputerWeekly.com

Computer Weekly – 26 February 2019: Delving into viewer data at the BBC
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the BBC about how the UK broadcaster is using data analytics to better understand its viewers and grow its audience. We look at how CERN is using IT automation in its quest to unravel the mysteries of the universe. And we examine the impact of GDPR on cloud storage. Read the issue now.
Posted: 08 Feb 2021 | Published: 22 Feb 2019

TechTarget ComputerWeekly.com

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TechTarget ComputerWeekly.com

Next stage of virtualisation: Containers
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The buzz and hype surrounding container technologies has reached fever pitch in recent years, prompting CIOs and IT decision makers to mull over what role, if any, they should and could play in their digital transformation plans.
Posted: 08 Feb 2021 | Published: 03 Apr 2017

TechTarget ComputerWeekly.com

Computer Weekly – 12 September 2023: The dangers of breaking encryption
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we detail the concerns of IT experts about the UK's Online Safety Bill's proposals to weaken end-to-end message encryption. Our buyer's guide continues to look at the issues around integrating SaaS applications, with a particular eye to the proliferation of SaaS during the Covid pandemic. Read the issue now.
Posted: 11 Sep 2023 | Published: 12 Sep 2023

TechTarget ComputerWeekly.com