Micro Electromechanical Systems White Papers

(View All Report Types)
Cloud Backup and Recovery
sponsored by Vision Solutions
WHITE PAPER: The right way to evaluate the quality of your system and data protection is to evaluate the Recovery Time Objective (RTO) and Recovery Point Objective (RPO). These metrics define how long you think it will take you to get back online and how current the data has to be. Read this white paper to learn more.
Posted: 28 Sep 2010 | Published: 28 Sep 2010

Vision Solutions

The Economic Evolution of Enterprise Storage
sponsored by Hitachi Vantara
WHITE PAPER: The latest technologies innovations provide a big, evolutionary stride in economically superior storage designed to swiftly address mounting data challenges and changing business demands. With 3D scaling and dynamic tiering, IT leaders can dynamically scale up, scale out and scale deep for increased performance and scalability.
Posted: 02 Dec 2010 | Published: 02 Dec 2010

Hitachi Vantara

The Future of Work Is Now
sponsored by Citrix Online Go To Meeting
WHITE PAPER: This whitepaper will help you learn about the workplace today, the people in it, and the trends they are driving that you need to know about.
Posted: 10 Jun 2013 | Published: 10 Jun 2013

Citrix Online Go To Meeting

Building Your Backup and Disaster Recovery Plan 101
sponsored by StorageCraft Technology Corporation
WHITE PAPER: Small and medium businesses cannot afford to lose access for their data. Research shows that even brief server failures lead most smaller businesses to shut their doors for good. In light of this, any business should develop a workable backup and disaster recovery plan.
Posted: 04 Jul 2011 | Published: 30 Jun 2011

StorageCraft Technology Corporation

SDN Integration: Centralized vs. Decentralized SDN Architecture
sponsored by TechTarget Security
EGUIDE: This e-guide from SearchSDN.com outlines the differences between distributed and centralized SDN architecture models to help you decide which would be best to deploy in your organization.
Posted: 17 May 2013 | Published: 17 May 2013

TechTarget Security

Marin County Upgrades Tax System While Reducing the Costs of the Mainframe
sponsored by Micro Focus, Ltd
CASE STUDY: The property tax system for Marin County, California, was increasingly expensive to maintain; furthermore, it was not possible to integrate it with newer modern technologies. Read this case study to learn how they updated and modernized this critical application without losing valuable IT assets embedded in the current system.
Posted: 27 Oct 2009 | Published: 27 Oct 2009

Micro Focus, Ltd

How To Build A Micro-segmentation Strategy
sponsored by Illumio
WHITE PAPER: Download this white paper to learn how to build an effective micro-segmentation strategy including identifying high-value assets, mapping your application dependencies and enrich with vulnerability data, understanding the types of segmentation for security, and more.
Posted: 28 Dec 2021 | Published: 04 Mar 2021

Illumio

HCL Insurance BPO Services Transforms Its Mainframe Environment to Reduce Costs by 75% and Improve Service Performance
sponsored by Micro Focus, Ltd
CASE STUDY: Following a Business Process Outsourcing agreement for the administration of Life and Pension products, HCL Insurance BPO Services, undertook a full analysis of the inherited infrastructure. A risk was identified with the third party mainframe used to host its CAPSIL insurance application.
Posted: 27 Oct 2009 | Published: 27 Oct 2009

Micro Focus, Ltd

City of Inglewood
sponsored by Micro Focus
WHITE PAPER: Access this white paper to discover how one city migrated from their aging mainframe to a Windows platform. Learn how your organization can save on maintenance costs and increase operational efficiency by making a similar move.
Posted: 14 May 2012 | Published: 14 May 2012

Micro Focus

Data Sheet: Trend Micro Deep Security 7
sponsored by Trend Micro
DATA SHEET: This data sheet outlines the benefits of Trend Micro Deep Security, which provides server security in physical, virtual, and cloud computing environments. This comprehensive solution also protects applications, operating systems, web applications, and enterprise systems from attacks.
Posted: 14 Apr 2010 | Published: 21 Oct 2009

Trend Micro

Enterprise Security Solutions by Trend Micro
sponsored by Trend Micro, Inc.
RESOURCE CENTER: This resource center will help you better understand Web threats, how they function, and their impacts, as well as why conventional methods fail to protect against these threats and the characteristics of a new approach required to ensure security, regulatory compliance, and business continuity.
Posted: 26 Jan 2009 | Published: 26 Jan 2009

Trend Micro, Inc.

Data Protection: Solutions for Privacy, Disclosure and Encryption
sponsored by Trend Micro, Inc.
WHITE PAPER: Trend Micro data protection solutions address privacy, breach disclosure, and encryption requirements with Email Encryption and Data Loss Prevention solutions. These solutions address common IT compliance challenges with accuracy, usability, and cost-effectiveness. Read this white paper for more details.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

The Future of Grocery Stores: Micro-Fulfillment Centers for Online Orders
sponsored by Hughes Network Systems
BLOG: In today’s rapidly changing retail landscape, grocery stores must find ways to remain competitive. Micro-fulfillment centers can provide a cost-effective solution to managing online orders and curbside pickup, taking grocery into the future of digital technology, and satisfying the complex demands of the modern customer. Read on to learn more.
Posted: 07 Jul 2023 | Published: 07 Jul 2023

TOPICS:  .NET
Hughes Network Systems

Business Rules and Gap Analysis: Discovery and Management of Business Rules Avoids Business Disruptions
sponsored by Micro Focus, Ltd
WHITE PAPER: This paper will assess how to locate and account for functionality gaps. It will also illustrate a methodology for realigning applications with business goals.
Posted: 04 Dec 2009 | Published: 23 Nov 2009

Micro Focus, Ltd

Prefabricated and Micro Datacentres: The Essential Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As debate continues to rage about what role private, enterprise-owned datacentres will play in firms' IT strategies in the years to come, what is becoming clear is that they type of facilities companies rely on are sure to change in line with their evolving business needs.
Posted: 08 Feb 2021 | Published: 26 Sep 2016

TechTarget ComputerWeekly.com

Top 10 Tips to Keep Your Small Business Safe
sponsored by Trend Micro, Inc.
WHITE PAPER: Read this paper to learn the top ten ways to protect your small business against web threats. Learn what you need to know about security and what are the key elements to address.
Posted: 19 Nov 2010 | Published: 17 Nov 2010

Trend Micro, Inc.

Case Study: Physician Organization Secures VMware Virtualized Environment with Trend Micro Deep Security 
sponsored by Trend Micro
CASE STUDY: This case study illustrates how a physicians' organization providing medical management services to 1,500 members was able to introduce Trend Micro's Deep Security solution and achieve increased security, increased flexibility, reduced costs, streamlined administration, and easy scalability.
Posted: 14 Apr 2010 | Published: 26 Oct 2009

Trend Micro

North Shore Medical Center Provides Better Support with AMD Processor-based Solutions
sponsored by HP, Vmware and AMD
CASE STUDY: Thanks to VMware, North Shore Medical Center provides better support for physicians and healthcare professionals while improving data center management with Advanced Micro Devices processor-based solutions.
Posted: 10 Jul 2008 | Published: 01 Jul 2008

HP, Vmware and AMD

Success Story: Company Maximizes Value with IBM Tivoli Storage Productivity Center
sponsored by IBM
WEBCAST: Check out this exclusive video to find out why one organization now calls IBM's storage productivity center tool a "must-have".
Posted: 04 Feb 2014 | Premiered: Feb 1, 2013

IBM

Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security
sponsored by Trend Micro, Inc.
WHITE PAPER: An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management.
Posted: 31 Jan 2011 | Published: 31 Jan 2011

Trend Micro, Inc.

Computer Weekly - 25 January 2022: Why watching your remote workers doesn't work
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the surge in home working led many firms to mandate use of surveillance software – we look at why it hasn't worked. It's an important year for public sector IT – we examine the trends for 2022. And with robotic process automation (RPA) booming, a Swedish bank explains the benefits. Read the issue now.
Posted: 23 Jan 2022 | Published: 25 Jan 2022

TechTarget ComputerWeekly.com

Next stage of virtualisation: Containers
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The buzz and hype surrounding container technologies has reached fever pitch in recent years, prompting CIOs and IT decision makers to mull over what role, if any, they should and could play in their digital transformation plans.
Posted: 08 Feb 2021 | Published: 03 Apr 2017

TechTarget ComputerWeekly.com

Computer Weekly: How cloud is saving lives
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how the power of public cloud is helping scientists to tackle diseases such as cancer and malaria. Big banks are turning to tech startups for innovation – we ask why. And our latest buyer's guide examines micro-datacentre technologies. Read the issue now.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

TechTarget ComputerWeekly.com

Case Study: DaimlerChrysler South Africa - Migrating Mission Critical Application Achieving Over 50% Cost Savings and Improving Service Levels
sponsored by Micro Focus, Ltd
CASE STUDY: In October 2003, DaimlerChrysler South Africa decided that significant cost savings could be achieved by migrating its mission critical systems onto a contemporary low cost platform and in the process remove the mainframe. This case study presents the challenges the company faced as well as the solution and benefits achieved.
Posted: 27 Oct 2009 | Published: 27 Oct 2009

Micro Focus, Ltd

The Business-Friendly Approach to Mobile Strategy
sponsored by Kony
WHITE PAPER: Access this whitepaper to discover an in-depth consideration of enterprise mobile strategies, and how to implement the right tools – including micro apps. Also discover the top 10 end-to-end mobile requirements.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

Kony

Securing Virtualized Data Centers
sponsored by Trend Micro, Inc.
EBOOK: On the surface, virtualized datacenters appear to have all of the same vulnerabilities and security challenges as conventional datacenters. With virtual machines, new challenges minimize the effectiveness of traditional protections. Read on to learn what it takes to secure today’s virtualized data centers.
Posted: 14 Dec 2009 | Published: 14 Dec 2009

Trend Micro, Inc.

Get Quick & Easy Access to IT Staffing with IM Link
sponsored by Ingram Micro
WEBCAST: This webcast covers an IT staffing service that will help fill in the holes in your understaffed IT department however you need it, and without breaking the bank.
Posted: 12 Dec 2013 | Premiered: Oct 25, 2013

Ingram Micro

Introduction to Blackberry® Java® Development
sponsored by BlackBerry
WEBCAST: The Blackberry® Java® Development Environment (BlackBerry JDE) is a fully integrated development environment and simulation tool for building Java Micro Edition (Java ME™) applications for Java-based Blackberry® smartphones.
Posted: 12 Jan 2009 | Premiered: Jan 12, 2009

BlackBerry

Expert E-Book: Data Security and the Cloud
sponsored by TechTarget Security
EBOOK: This e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing.
Posted: 07 Feb 2011 | Published: 07 Feb 2011

TechTarget Security