222 Results for:M4B

  • Sort by: 

Computer Weekly announces the Most Influential Women in UK Tech 2020

By Clare McDonald 01 Oct 2020

Computer Weekly has revealed who is on this year’s list of the 50 Most Influential Women in UK Tech, including this year’s winner Anne-Marie Imafidon Read More

Oracle pushes Sparc Supercluster and Sparc Exalogic server hardware

By Mark Fontecchio 03 Dec 2010

Oracle rolled out a refresh of its Sparc-based servers, including a new Sparc-based Exalogic Elastic Cloud middleware server. Read More

Smart speakers open new windows into customer behaviour for CRM

By Lindsay Clark 02 Jan 2018

Voice recognition has become a new frontier for customer relationship management. What does the new voice channel mean for understanding consumers and how will voice data integrate with existing customer ... Read More

Basic disassembly: Decoding the opcode

By Robert Crawford 12 Sep 2011

Programmers can find benefit from disassembling object code–a lost art that begins with understanding the opcode. Read More

Cisco et al. push memory-dense servers; but at what cost?

By Alex Barrett 21 Oct 2010

Today’s x86 servers offer impressive memory densities, but some IT shops want even more. Read More

Tracking user activity with AWS CloudTrail

By Judith Myerson 22 Jul 2014

AWS CloudTrail is a Web service that keeps track of AWS API calls in your account and stores logs from multiple accounts and multiple regions in the same S3 bucket. Learn to turn on AWS CloudTrail and to find and ... Read More

MS-CLIS at IIIT Allahabad: Evaluation of the post grad course in infosec

14 Apr 2011

With numerous infosec certs to choose from, we look at how the master’s in information security and cyber law (MS-CLIS) at IIIT Allahabad is different Read More

Storage Word Search: Summer IT fun

19 Jun 2006

How about some summer storage fun? Try out SearchStorage.com's Word Search game. See if you can find the 15 terms listed. Read More

Taking over the domain

18 Aug 2005

This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes. Read More