SOC White Papers

(View All Report Types)
Desktop Admin for BYOD: Security Chapter
sponsored by TechTarget Security
WHITE PAPER: The risk presented by BYOD should not prevent companies from taking advantage of its benefits, including flexibility and cost savings.  Inside, learn how to clearly define your BYOD security strategy and get the most out of this trend.
Posted: 21 Feb 2013 | Published: 21 Feb 2013

TechTarget Security

HP CarePack Services Defined
sponsored by Insight and HP
WHITE PAPER: HP Care Pack Services are support packages that expand and extend standard warranties for HP hardware and software. HP Care Pack Services provide hardware and software support, installation services, education services and premium support options to meet the needs of business-critical IT environments. View this data sheet to learn more.
Posted: 03 Mar 2014 | Published: 31 Dec 2012

Insight and HP

Improving Data Center Infrastructure with Oracle's x86 Systems
sponsored by Oracle Corporation
WHITE PAPER: Learn how your organization can fight the complexity that usually comes with virtualization and cloud computing. This white paper presents a vendor that can offer a complete hardware and software stack for virtualized x86 infrastructures which allows enhanced reliability, optimized performance and cost savings.
Posted: 27 Jun 2012 | Published: 25 Jun 2012

Oracle Corporation

Top 3 Reasons for IT to Adopt Desktop Virtualization
sponsored by VMware
WHITE PAPER: This whitepaper explains the three major reasons organizations should absolutely consider VDI for the business.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

VMware

Future Proofing Your Mobile Computers: How the Features You Select Now Can Protect & Extend Your Investment Years into the Future
sponsored by Intermec
WHITE PAPER: This white paper explains how the features and options available for ruggedized mobile computers used in warehousing and distribution can extend the time they can perform in warehouses and distribution centers. It also provides guidance on how to make decisions that will protect your investments by meeting user needs today and into the future.
Posted: 12 May 2011 | Published: 12 May 2011

Intermec

Dell PowerVault MD3000 1000 Mailbox Local Continuous Replication Microsoft Exchange 2007 Storage Solution
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper describes a tested and validated storage solution for a 1000 mailbox Exchange Server 2007 environment with Local Continuous Replication (LCR) feature.
Posted: 27 Aug 2008 | Published: 27 Aug 2008

DellEMC and Intel®

Why Linux Virtualization is Ready for Prime Time
sponsored by Red Hat - HPE
WHITE PAPER: Access this white paper to discover the benefits of virtualizing Linux workloads. This resource examines the historical concerns about Linux virtualization and outlines how enterprises can safely make this transition.
Posted: 20 Sep 2012 | Published: 20 Sep 2012

Red Hat - HPE

Best Practices for Implementing a Data Warehouse on Oracle Exadata Database Machine
sponsored by Oracle Corporation
WHITE PAPER: By using the Oracle Exadata Database Machine as a data warehouse platform you have a balanced, high performance hardware configuration. This paper focuses on the other two corner stones, data modeling and data loading, providing a set of best practices and examples for deploying a data warehouse on the Oracle Exadata Database Machine.
Posted: 25 Apr 2011 | Published: 30 Nov 2010

Oracle Corporation

Microsoft SQL Server 2012 Solutions for OLTP Applications on Dell PowerEdge VRTX
sponsored by Dell India
WHITE PAPER: Explore this exclusive white paper to find out about Dell's first shared IT infrastructure solution that's specifically designed for remote and small office environments.
Posted: 17 Feb 2014 | Published: 30 Jun 2013

Dell India

IT Security: Built-In Protection with Intel vPro Technology
sponsored by Intel
WHITE PAPER: New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.
Posted: 12 Jun 2012 | Published: 01 May 2012

Intel