Hyper-threading Reports

8 Simple Rules for Designing Threaded Applications
sponsored by Intel Software Network
WHITE PAPER: This article gives 8 Simple Rules that you can add to your palette of threading design methods. By following these rules you will have more success in writing the best and most efficient threaded implementation of your applications.
Posted: 14 Aug 2009 | Published: 28 Nov 2007

Intel Software Network

From a Few Cores to Many: A Tera-scale Computing Research Overview
sponsored by Intel Corporation
WHITE PAPER: This white paper provides and overview of the Intel® Tera-scale Computing Research Program, Intel's overarching effort to shape the future of Intel processors and platforms. Learn about the heart of Intel's research-achieving c...
Posted: 26 Jun 2007 | Published: 01 Jan 2006

Intel Corporation

16 Tips for Working Smarter with Slack Apps and Workflows
sponsored by Slack
WHITE PAPER: Learn how to harness Slack's integrations and advanced features automate workflows and optimise communication.
Posted: 20 Dec 2023 | Published: 20 Dec 2023

TOPICS:  IT Management
Slack

16 Tips for Working Smarter with Slack Apps and Workflows
sponsored by Slack
WHITE PAPER: Learn how to harness Slack's integrations and advanced features automate workflows and optimise communication.
Posted: 20 Nov 2023 | Published: 20 Nov 2023

TOPICS:  IT Management
Slack

Ten Ways to Replace Ineffective Meetings
sponsored by Slack
WHITE PAPER: How your business can increase productivity and cut costs by swapping meetings with asynchronous work and task automation.
Posted: 20 Dec 2023 | Published: 20 Dec 2023

TOPICS:  IT Management
Slack

12 API security best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
Posted: 14 Feb 2023 | Published: 14 Feb 2023

TechTarget ComputerWeekly.com

Computer Weekly – 7 November 2023: How ExxonMobil is leading with data
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the leader of ExxonMobil's data organisation, about the energy giant's strategy to establish enterprise-wide principles for the use of data. As the UK's Online Safety Act comes into force, we examine the tech sector's concerns over the laws around end-to-end encryption. Read the issue now.
Posted: 06 Nov 2023 | Published: 07 Nov 2023

TechTarget ComputerWeekly.com

Computer Weekly – 8 August 2023: How to improve developer productivity
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide examines the developer experience and looks at how critical it can be for productivity. The tech sector still struggles with diversity and inclusion – we ask what's standing in the way of ethnic minorities making it to the top. Read the issue now.
Posted: 04 Aug 2023 | Published: 08 Aug 2023

TechTarget ComputerWeekly.com

Computer Weekly – 24 October 2023: Brewing data insights at Heineken
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how brewing giant Heineken is building a data ecosystem to share insights and tap into AI capabilities. The UK is conducting an investigation into cloud supplier dominance – what will it mean for users? And we examine how generative AI could be used to improve customer experience. Read the issue now.
Posted: 24 Oct 2023 | Published: 24 Oct 2023

TechTarget ComputerWeekly.com

The Holistic Identity Security Maturity Model
sponsored by CyberArk
WHITE PAPER: Understanding where your organization stands in the Identity Security Maturity Model can help you identify gaps and plan for improvement in your Identity Security strategy. Read this paper to learn more and find your place in the model.
Posted: 24 Mar 2023 | Published: 24 Mar 2023

TOPICS:  IT Management
CyberArk