Fibre Channel over IP Reports

Server Virtualization: Expert Overview of Costs, Trends and More
sponsored by DellEMC and Intel®
EGUIDE: Understanding the costs and trends associated with server virtualization is very important, as well as understanding the role of virtual platforms for your business.
Posted: 30 Nov 2011 | Published: 30 Nov 2011

DellEMC and Intel®

A Computer Weekly buyer’s guide to perimeterless network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

TechTarget ComputerWeekly.com

The Journey to Unified Computing
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper explains how virtualization has removed many of the data center resource constraints of the past. Find out why management of your IT infrastructure should be integrated and learn how to set your business up for private cloud success.
Posted: 02 Jun 2011 | Published: 01 Apr 2010

Cisco Systems, Inc.

Improve BYOD with the Bonjour Protocol
sponsored by Aerohive Networks
EGUIDE: This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Aerohive Networks

An Introduction to Quantum Lifecycle Management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012

TechTarget ComputerWeekly.com

Dell/EMC CX4 Exchange Performance
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper takes a high-level look at the features and functionality that make the CX4 an excellent choice for Microsoft Exchange and other electronic mail systems. It examines new features, discusses disaster recovery and VMware integration, and provides a brief example of CX4's performance in Exchange environments.
Posted: 05 May 2009 | Published: 08 Oct 2008

DellEMC and Intel®

Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER: This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

IBM

HP StorageWorks 4400 Enterprise Virtual Array (EVA4400) Performance
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this white paper learn how sequential performance provides customers with improved data transfer rates for applications such as data warehousing, streaming video, high-performance technical computing, and backups and restores.
Posted: 07 Aug 2008 | Published: 01 Aug 2008

Hewlett Packard Enterprise

Virtualization Roadmap: Twists, Turns, and Key Considerations
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: This expert presentation transcript explores key management factors you should consider as you navigate your virtualization initiative, including licensing, memory capabilities, and more. Hear about one company's virtualization roadmap and determine whether it aligns with your own virtualization plans.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Dell, Inc. and Intel®

E-Guide: Prioritizing Application Security Concerns
sponsored by TechTarget Security
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

TechTarget Security