Software  >   Systems Software  >   Utility Software  >   File Management Programs  >  

Copy Programs

RSS Feed    Add to Google    Add to My Yahoo!
Copy ProgramsWhite Papers (View All Report Types)
 
File Server Migration: Pain is in permissions
sponsored by Dell Software
WHITE PAPER: Access this white paper to discover a three-phase approach to easily fixing problematic file permissions and securely migrating files even in the most complex environments.
Posted: 29 Aug 2012 | Published: 29 Aug 2012

Dell Software

SDN in the Data Center: Are You Ready?
sponsored by Dell, Inc.
WHITE PAPER: Check out this concise resource to learn about the three SDN approaches, and what an "SDN-ready" platform should offer.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

Dell, Inc.

Reduce Cost and Complexity of Your Backup with NetBackup Backup Appliance
sponsored by Symantec Corporation
WHITE PAPER: There is a backup appliance specifically designed to eliminate the effort and time of installing and maintaining your disaster recovery and backup software and hardware, while saving you money. Read on to learn more.
Posted: 30 Dec 2013 | Published: 30 Nov 2013

Symantec Corporation

SANS Survey on Application Security Programs and Practices
sponsored by Hewlett-Packard Company
WHITE PAPER: This SANS report pinpoints where the vulnerability gaps lie in today's application security programs. Click through for key recommendations on how to address these issues.
Posted: 04 Apr 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

Dropbox Quick Start
sponsored by Dell, Inc.
WHITE PAPER: Check out this concise resource to learn more about Dropbox software and what it can do for you.
Posted: 07 Mar 2014 | Published: 07 Mar 2014

Dell, Inc.

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork

Red Hat JBoss Business Rules Management System: Best Practices Guide
sponsored by Red Hat
WHITE PAPER: In this informative technology detail, discover best practices for development with Red Hat JBoss business rules management system. It will focus on three key areas of rules development: rule authoring, designing the domain or fact model and various aspects related to rule execution.
Posted: 07 Jun 2013 | Published: 31 Dec 2012

Red Hat

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.

SanDisk FlashSoft for VMware vSphere
sponsored by SanDisk Corporation
WHITE PAPER: In this brief white paper, you will get insight into an innovative SanDisk product that accelerates application performance in VMware guest machines.
Posted: 07 May 2013 | Published: 31 Dec 2012

SanDisk Corporation

The Application Migration Workbook
sponsored by Citrix Systems, Inc.
WHITE PAPER: Discover how to achieve pain-free application migrations in this essential workbook and guide. Read on to uncover key strategies and technologies that can simplify the process and lay the foundation for more effective application management.
Posted: 17 Jul 2012 | Published: 17 Jul 2012

Citrix Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement