Standards  >   Interface Standards  >  

HIPPI

RSS Feed    Add to Google    Add to My Yahoo!
HIPPI White Papers (View All Report Types)
 
Accelerating Performance and Reducing Costs for Data-Intensive High Performance Computing (HPC) Workflows
sponsored by Sun Microsystems, Inc.
WHITE PAPER: Read this white paper to learn about how you can deliver the necessary I/O throughput for HPC applications. It will also cover Sun's offerings for addressing HPC challenges in the form of flash technology, network attached storage, parallel storage, and archive solutions.
Posted: 12 May 2009 | Published: 01 Apr 2009

Sun Microsystems, Inc.

Going Parallel with LabVIEW Delivers Throughput Gains
sponsored by National Instruments
WHITE PAPER: In this whitepaper learn how by combining technologies with NI Lab VIEW parallel programming software and NI TestStand test management software, test engineers can create high-performance test systems.
Posted: 16 Sep 2008 | Published: 16 Sep 2008

National Instruments

Lustre Leadership: Cray's Story
sponsored by Cray
WHITE PAPER: In this white paper, discover a parallel file system that is being implemented across the high performance computing (HPC) industry – enhancing new applications and providing high levels of scalability to meet a wide range of workloads in standard IT environments.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

Cray

Cray Sonexion™ Data Storage System
sponsored by Cray
WHITE PAPER: This white paper outlines the features and benefits of the Cray Sonexion Lustre appliance approach while comparing and contrasting it to traditional component-based approaches.
Posted: 25 Apr 2013 | Published: 31 Dec 2012

Cray

High-Performance Computing Platform Powers Complex Calculations
sponsored by Intel
WHITE PAPER: This resource is a real-world case study of how Danielson Engineering utilized a high-performance computing platform to optimize mission-critical calculation and simulation applications.
Posted: 29 May 2013 | Published: 29 May 2013

Intel

Top 4 Security Concerns of the SaaS Delivery Model
sponsored by SAP
WHITE PAPER: This white paper addresses security concerns brought forth by cloud and SaaS models, including identity management, data storage, and data transmission. Learn the imperatives of built-in security features when it comes to your deployment.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

SAP

Strategic Migration Planning Guide: Weblogic to JBoss Enterprise Application Platform
sponsored by Red Hat
WHITE PAPER: Read about the proven five-step process designed to identify migration opportunities, examine the risks associated with various migration scenarios, create a standard enterprise environment, and develop a comprehensive and strategic migration plan to the JBoss Enterprise Application Platform.
Posted: 28 Jul 2015 | Published: 30 Sep 2014

Red Hat

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

IEEE 1149.1 Use in Design for Verification and Testability at Texas Instruments
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document introduces those products that include ASIC cells, standard interface ICs, a bus master IC, a controller interface board for IBM compatibles, a high-speed scan interface, and software to control the scan bus.
Posted: 17 Mar 2002 | Published: 05 May 2000

Texas Instruments, Inc.

Securing the Foundation of Information Technology (IT) Systems
sponsored by Trusted Computer Solutions
WHITE PAPER: This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.
Posted: 12 Jan 2010 | Published: 12 Jan 2010

Trusted Computer Solutions
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement