IT Agents  >   Professional Organizations  >   Information Industry Professional Organizations  >  

Technical Communities

RSS Feed    Add to Google    Add to My Yahoo!
Technical Communities White Papers (View All Report Types)
 
Ensuring Desktop Virtualization Success
sponsored by VMware
WHITE PAPER: This white paper can provide you with all the essential information you need to know before deploying VDI in your organization.
Posted: 30 Jun 2015 | Published: 31 Dec 2012

VMware

Evolve or Die: Security Adaptation in a Virtual World
sponsored by BitDefender
WHITE PAPER: This white paper describes and suggests solutions for some of the biggest issues in virtualization security.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender

Case Study: College Encourages Personalized Learning through Its VDI
sponsored by NVIDIA/VMware
WHITE PAPER: In this case study, discover how a community college employed avirtual desktop infrastructure that enabled high-quality online learning with the maximum amount of flexibility.
Posted: 28 May 2015 | Published: 28 May 2015


Newest Data Center Dilemma: Security vs. Performance
sponsored by BitDefender
WHITE PAPER: This white paper elaborates on the security concerns of virtualized environments and why traditional security approaches don't work.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender

Oxilion Deploys Red Hat Enterprise Virtualization to Keep Customers Satisfied
sponsored by Red Hat.
WHITE PAPER: Access this white paper to discover a new virtualization platform with cloud capabilities that delivers flexibility, scalability and cost requirements to virtual data centers.
Posted: 16 May 2011 | Published: 16 May 2011

Red Hat.

The Best of Both Worlds: The Hybrid Cloud
sponsored by CA Technologies.
WHITE PAPER: To handle the demands of modern business, CIOs must manage their internal data centers more effectively and learn how to leverage public cloud resources. The solution: a hybrid cloud strategy facilitated by a dynamic data center. Read on to learn more.
Posted: 07 Dec 2010 | Published: 07 Dec 2010

CA Technologies.

The Virtual Office Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.

Accelerate Business Through a Cost-efficient Virtual Workforce: Citrix Transforms IT into an On-Demand Service for Virtual Workers
sponsored by Citrix
WHITE PAPER: This white paper defines a virtual workforce, describes the challenges and requirements that organisations face when supporting a virtual workforce, and explains how Citrix solutions can address these requirements and scale accordingly to foster and support future growth.
Posted: 18 Sep 2009 | Published: 25 May 2009

Citrix

Content-Aware Identity & Access Management in a Virtual Environment
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage. 
Posted: 22 Sep 2010 | Published: 01 Jun 2010

CA Technologies.

How can I Overcome the Security Challenges of Today’s Virtualized Infrastructures?
sponsored by CA Technologies.
WHITE PAPER: Read this solution brief to learn how to improve control over systems, applications and information to reduce risk in both physical and virtual server environments.
Posted: 25 Nov 2010 | Published: 01 Sep 2010

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement