Hardware  >   Office Equipment and Supplies  >   Printer Cartridges  >  

Inkjet Printer Cartridges

RSS Feed    Add to Google    Add to My Yahoo!
Inkjet Printer Cartridges White Papers (View All Report Types)
 
Desktop Admin for BYOD: Security Chapter
sponsored by SearchSecurity.com
WHITE PAPER: The risk presented by BYOD should not prevent companies from taking advantage of its benefits, including flexibility and cost savings.  Inside, learn how to clearly define your BYOD security strategy and get the most out of this trend.
Posted: 21 Feb 2013 | Published: 21 Feb 2013

SearchSecurity.com

Requirements for Selecting a Universal Enterprise App Store
sponsored by Flexera Software
WHITE PAPER: This white paper discusses the challenges in today's application delivery and how you can overcome them with an enterprise app store. Read on to explore key criteria that an enterprise app store must meet in order to resolve today's app delivery challenges.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

Flexera Software

Top 5 Server Cluster Setup Mistakes
sponsored by Idera
WHITE PAPER: Uncover the top 5 SQL Server cluster setup mistakes and learn how to avoid them.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

Idera

Maximizing Oracle Database Performance and Minimizing Licensing Costs in Virtualized Environments
sponsored by Embarcadero Technologies, Inc.
WHITE PAPER: If you missed this September 2010 webcast on Oracle Database Performance and Licensing Dynamics in Virtualized Environments, here's your chance to catch up on the discussion. This white paper highlights the webcast, including an extensive Q&A and tips for maximizing Oracle Database performance and minimizing licensing costs.
Posted: 12 May 2011 | Published: 12 May 2011

Embarcadero Technologies, Inc.

Oracle Exalogic Elastic Cloud: A Brief Introduction
sponsored by Oracle Corporation
WHITE PAPER: A steady pattern of innovation, expansion, and acquisition can quickly result in a sprawling infrastructure that is difficult to manage. This white paper explores tools and practices that have emerged to address this issue and recommends actions you can take to lay the foundation for the cloud.
Posted: 12 Oct 2011 | Published: 01 Mar 2011

Oracle Corporation

Oracle TimesTen In-Memory Database on Oracle Exalogic Elastic Cloud
sponsored by Oracle Corporation
WHITE PAPER: This white paper outlines a memory-optimized relational database that provides detailed visibility into the performance of your critical applications. Learn more about this platform and its key features and installation steps here.
Posted: 06 Jul 2012 | Published: 01 Jun 2011

Oracle Corporation

Desktop virtualization architecture designed for on-demand growth
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: Access this exclusive, informative resource to find out how one data center solution can provide you with the support you need for desktop virtualization.
Posted: 14 Mar 2014 | Published: 31 Dec 2013

Cisco Systems, Inc and Citrix

Indonesia Stock Exchange halves its hardware investment cost with a Red Hat Solution
sponsored by Red Hat and Intel
WHITE PAPER: This brief whitepaper explains how the Indonesian Stock Exchange (IDX) was able to half its hardware costs by leveraging a Linux system to support trading machines, surveillance machines, database engines, and more.
Posted: 16 Dec 2013 | Published: 16 Dec 2013

Red Hat and Intel

ADC-VX Whitepaper: The Agility of Virtual; The Predictability of Physical
sponsored by Radware
WHITE PAPER: Read our white paper, to learn how ADC-VX is an ideal solution for large enterprises, hosting and service providers as well as cloud providers that aspire to achieve significant cost savings by consolidating multiple dedicated ADC devices into a single, cost-effective consolidated ADC device.
Posted: 10 May 2011 | Published: 10 May 2011

Radware

PC-Disable Delivers Intelligent Client-Side Protection for Lost or Stolen Notebooks
sponsored by Absolute
WHITE PAPER: Read this white paper to learn how new hardware-based technology, could help reduce the incidence of notebook theft. The result can be better protection of assets and sensitive data on notebooks, rapid reactivation when systems are returned, and reduced business risk.
Posted: 14 Dec 2009 | Published: 14 Dec 2009

Absolute
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement