Micro Processor Reports

Computer Weekly – 6 February 2024: Generative AI – an early adopter's experience
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.
Posted: 05 Feb 2024 | Published: 06 Feb 2024

TechTarget ComputerWeekly.com

Extending the World's Most Popular Processor Architecture
sponsored by Intel Corporation
WHITE PAPER: This paper will provide a brief background on instruction set architecture (ISA) and review new instructions, including SSE4 vectoring compiler and media accelerators, SSE4 efficient accelerated string and text processing, and Application T...
Posted: 26 Jun 2007 | Published: 01 Jan 2006

Intel Corporation

Oracle Unbreakable Linux: True Enterprise-Quality Linux Support
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper for tips on selecting the best support approach for your IT shop's Linux platform. You'll learn about various options and the essential components of a successful support system.
Posted: 17 Dec 2008 | Published: 17 Dec 2008

Oracle Corporation

The System x X5 Difference IBM Innovation on Industry Standard Servers
sponsored by IBM
WHITE PAPER: This white paper shows how IBM eX5 systems allow organizations to combine the full advantages of Intel’s Xeon processors with the latest and most advanced System x features - allowing companies to do more with fewer servers and achieve better system utilization and energy efficiency.
Posted: 19 Jan 2011 | Published: 19 Jan 2011

IBM

Intelligence that Adapts to Your Needs
sponsored by Intel
WHITE PAPER: The all new 2010 Intel Core vPro processor family is designed to keep downtime and desk-side visits to a minimum.
Posted: 28 Apr 2010 | Published: 28 Apr 2010

Intel

IBM Systems Solution with SAP Discovery System
sponsored by IBM
WHITE PAPER: Whether you plan to integrate new SAP products into your infrastructure or are preparing for an upgrade, the IBM Systems solution with SAP Discovery system can help you thoroughly evaluate SAP applications - and validate their benefits.
Posted: 19 Jan 2011 | Published: 19 Jan 2011

IBM

Intel® Cloud Builders Guide: Cloud Design and Deployment on Intel® Platforms - Enhanced Cloud Security with HyTrust* and VMware*
sponsored by Intel
WHITE PAPER: This reference architecture explains a secure cloud infrastructure deployment and operation. It describes a cloud built with VMware, vSphere*, Intel® Xeon® processor 5600 series-based server platforms, and a HyTrust Appliance* designed to enforce cloud security policies, including those based on platform trust attestation provided by Intel® TXT.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Intel

Virtualizing Business-Critical Applications
sponsored by VMware and Intel
WHITE PAPER: Many IT organizations are interested in virtualizing their business-critical applications but want to be absolutely certain they can deliver the same or better performance, scalability and availability in a virtualized environment. In the vast majority of cases they can. Read this paper to learn about VMware and Intel solutions.
Posted: 28 Sep 2010 | Published: 28 Sep 2010

VMware and Intel

Presentation Transcript: Virtualize Tier-1 Apps with No Fear
sponsored by Stratus Technologies
PRESENTATION TRANSCRIPT: This transcript of the "Virtualize Tier-1 Apps with No Fear" webcast explains how companies are committing critical workloads to their virtual infrastructures.
Posted: 08 Sep 2010 | Published: 08 Sep 2010

Stratus Technologies

Evolution of Integrity Checking with Intel® Trusted Execution Technology: an Intel IT Perspective
sponsored by Intel
WHITE PAPER: As part of an effort to address security concerns, Intel IT evaluated Intel® Trusted Execution Technology (Intel® TXT), a new security technology in Intel® processors. Intel TXT is a foundation technology that can be applied to enhance security in multiple usage models. Read this white paper to learn more.
Posted: 02 May 2011 | Published: 25 Mar 2011

Intel