Software  >   Systems Software  >   Operating Systems  >   PC Operating Systems  >  

Disk Operating System

RSS Feed    Add to Google    Add to My Yahoo!
Disk Operating System White Papers (View All Report Types)
 
Take Control of Converged Applications With a Smarter Network Operating System
sponsored by Extreme Networks
WHITE PAPER: Access this informative white paper to learn why a particular modular operating system plays a vital role in building networks that run today's business applications.
Posted: 16 Feb 2015 | Published: 31 Dec 2014

Extreme Networks

Uncover the Top Ten Database Threats That Could Affect Your Business
sponsored by Imperva
WHITE PAPER: This white paper highlights the top ten threats that affect traditional databases as well as Big Data technologies.
Posted: 03 Mar 2015 | Published: 31 Dec 2014

Imperva

Evolving Security Technologies Present New Opportunities for Businesses
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Distributed Object Store Principles of Operation: The Case for Intelligent Storage
sponsored by Hitachi Data Systems
WHITE PAPER: This resource explores the growth of distributed object stores (DOS) and examines the underlying mechanisms that guide their use and development.
Posted: 16 Feb 2012 | Published: 16 Feb 2012

Hitachi Data Systems

Threat Analysis: Understanding and Combating DDoS Attacks
sponsored by Dell SecureWorks
WHITE PAPER: This analysis focuses on the types of attacks generally referred to as distributed denial-of-service, or DDoS, attacks. DDoS attacks are most often used to extort or damage businesses whose websites or online assets are a major source of revenue, are an indicator of brand value, or are critical to operations.
Posted: 31 May 2011 | Published: 31 May 2011

Dell SecureWorks

Seven steps to software security
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Posted: 01 Feb 2015 | Published: 01 Sep 2013

Hewlett-Packard Company

Enterprise Software Security Strategies Pulse Report (SSA)
sponsored by Hewlett-Packard Company
WHITE PAPER: This survey report by Gatepoint Research explores the extent to which IT organizations employ application security testing and remediation solutions.
Posted: 01 Feb 2015 | Published: 31 Oct 2014

Hewlett-Packard Company

How new F&A Solutions Can Help CFOs Improve Forecasting Performance
sponsored by Anaplan
WHITE PAPER: Access this white paper to find out how new FP&A software can help CFOs improve forecasting performance and provide universal access through mobile devices and increasingly powerful analytics while lowering the entry barriers to software deployment.
Posted: 13 Jan 2015 | Published: 31 May 2014

Anaplan

Case Study: Storebrand Choose API Software to Secure Communications
sponsored by Axway
WHITE PAPER: Storebrand, a leader in Nordic long-term savings and insurance, needed a platform that was flexible, easy to use, and that would enable a rapid time-to-market for new integrations.Access this case study to find out how deploying API software secured communications with partners and governed the flow of data.
Posted: 19 Feb 2015 | Published: 10 Feb 2015

Axway
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement