Hardware  >   Electronics Equipment  >   Audiovisual Equipment  >   Audio Equipment  >  

DAT Players

RSS Feed    Add to Google    Add to My Yahoo!
DAT Players White Papers (View All Report Types)
 
Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

IBM FlashSystem 900: Value at the Core
sponsored by IBM
WHITE PAPER: Access this white paper to learn how flash storage can boost storage performance and speed up processing times. Read on to learn about the technology behind a new flash storage system.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

IBM

Bringing Order to IT Chaos in Remote Offices
sponsored by Dell, Inc. & Intel®
WHITE PAPER: Take a look at this exclusive resource to find out how this converged infrastructure hardware can help you enable business success.
Posted: 18 Feb 2014 | Published: 30 Jun 2013

Dell, Inc. & Intel®

IT as a Service broker: A Technical View
sponsored by Rackspace
WHITE PAPER: Becoming the services broker for the organization can make it possible for IT to meet enterprise guidelines. Read this white paper to examine the impact of the service broker model, how it can be implemented, and how it allows the IT department to satisfy client needs quickly while minimizing risk and meeting corporate IT management standards.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Rackspace

Performance, Reliability and Flexibility of Windows 7 in a Thin Client
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This whitepaper takes a look at a series of desktop virtualization hardware solutions with dual and quad core options to suit your unique budget, application, and performance needs
Posted: 11 Nov 2014 | Published: 11 Nov 2014

Dell, Inc. and Intel®

Desktop Admin for BYOD: Security Chapter
sponsored by SearchSecurity.com
WHITE PAPER: The risk presented by BYOD should not prevent companies from taking advantage of its benefits, including flexibility and cost savings.  Inside, learn how to clearly define your BYOD security strategy and get the most out of this trend.
Posted: 21 Feb 2013 | Published: 21 Feb 2013

SearchSecurity.com

Busting Solid-State Storage Myths: Maximizing the Impact of Flash
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to bust common solid state storage myths, and find out exactly how some companies are using flash to reach their data storage goals.
Posted: 12 Mar 2015 | Published: 31 Jul 2014

Dell, Inc. and Intel®

An Innovative Approach to Solid-State Storage
sponsored by Hitachi Data Systems
WHITE PAPER: Access this white paper to learn about one flash storage system that takes costs into account, for both large and small businesses. Read on to find out to overcome the management challenges of high velocity data.
Posted: 13 May 2015 | Published: 30 Apr 2015

Hitachi Data Systems

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
sponsored by IBM
WHITE PAPER: This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
Posted: 12 May 2014 | Published: 31 Jan 2014

IBM

Best Practices for successful IP Address Management (IPAM)
sponsored by Infoblox
WHITE PAPER: This white paper discusses several ways to develop a successful IPAM strategy.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

Infoblox
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement