Standards  >   Storage Standards  >  


RSS Feed    Add to Google    Add to My Yahoo!
Bluefin White Papers (View All Report Types)
Reduce Operating Expenses with SRM: Standards-based Approach Extends Management to Third-party Devices and Tape Libraries
sponsored by Quantum Corporation
WHITE PAPER: Efficiently managing your storage resources is becoming increasingly challenging. Download this white paper today and discover a strategic approach to monitoring and managing all aspects of your storage assets.
Posted: 22 Feb 2007 | Published: 01 Jan 2005

Quantum Corporation

Storage Management as a Service: Using SaaS to Revolutionize SRM
sponsored by Diogenes Labs
WHITE PAPER: Storage management software is a number one purchasing priority for IT managers and Software as a Service (SaaS) applications have become the most viable and practical solution.
Posted: 23 May 2007 | Published: 01 May 2007

Diogenes Labs

Getting Virtualisation Right: Five Virtualisation Rules Every Organisation Must Know
sponsored by Hewlett Packard Enterprise
WHITE PAPER: HP has identified five common virtualisation rules employed by organisations that have succeeded where others have not. While technology differs in complexity and scale from one business to the next, nearly every successful organisation deployed the same five rules to realise the full potential of virtualisation.
Posted: 29 Sep 2009 | Published: 20 Aug 2009

Hewlett Packard Enterprise

Virtualize Your End-to-End IT infrastructure and Reduce OpEx and CapEx
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Many companies that have deployed server virtualization are still struggling with massive data growth, rising storage maintenance cost, and underutilized storage assets from a multitude of vendors. A virtual storage infrastructure from HP can double your capacity utilization and cut management costs in half.
Posted: 23 Sep 2009 | Published: 21 Sep 2009

Hewlett Packard Enterprise

Choose Your Next SOA Implementation Step Carefully
sponsored by Seros
WHITE PAPER: This white paper discusses the critical role of an ESB and an open standards-based reference architecture in a successful SOA initiative.
Posted: 25 Jun 2008 | Published: 25 Jun 2008


Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009


You’re Not As Backed Up As You Think
sponsored by EMC Corporation
WHITE PAPER: Learn how to overcome the challenges of traditional data backup for your small to mid-size organization and discover the benefits of implementing a Software-As-A-Service (SaaS) backup solution.
Posted: 11 Dec 2009 | Published: 11 Dec 2009

EMC Corporation

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Securing the Foundation of Information Technology (IT) Systems
sponsored by Trusted Computer Solutions
WHITE PAPER: This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.
Posted: 12 Jan 2010 | Published: 12 Jan 2010

Trusted Computer Solutions
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement