Software  >   Systems Software  >  

Utility Programs

RSS Feed    Add to Google    Add to My Yahoo!
Utility Programs White Papers (View All Report Types)
 
Is Utility Hosting Right For Your Business?
sponsored by AT&T Corp
WHITE PAPER: Compared to dedicated hosting, utility hosting is easily scalable and standardized as a turnkey package. Its chief advantage is that you pay only for the computing capacity that you use. A good time to adopt this solution is when change is taking place.
Posted: 04 Aug 2010 | Published: 04 Aug 2010

AT&T Corp

IDC Opinion: The Economic Impact of File Virtualization - Reducing Storage Costs and Improving Management Efficiency
sponsored by F5 Networks
WHITE PAPER: Enterprises are adopting new strategies for building file-based storage solutions. In several interviews, IDC found that companies are increasing their file-based storage by 50-120% a year, placing a high priority on efficiency.
Posted: 28 Apr 2008 | Published: 01 May 2007

F5 Networks

Streamlining Multifunction Printer Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper describes an example of how you can efficiently enhance your MFP security with centralized and automated security settings.
Posted: 11 Feb 2015 | Published: 31 Mar 2013

Hewlett Packard Enterprise

Compression in DB2 Viper
sponsored by IBM Software Group
WHITE PAPER: The DB2 Viper is contributing significant advancements in database compression technology. This white paper compares the leading data server compression utilities and details how to reduce storage costs and improve performance.
Posted: 16 Nov 2006 | Published: 01 May 2006

IBM Software Group

Beyond FTP: Securing and Managing File Transfers
sponsored by Linoma Software
WHITE PAPER: Every day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol.
Posted: 15 Mar 2010 | Published: 15 Mar 2010

Linoma Software

Getting Started With LucidWorks Enterprise
sponsored by Lucid Works
WHITE PAPER: This document provides a working knowledge of the LucidWorks Enterprise search development platform. Learn about installation, indexing content from local files, web sites, databases, searching, as well as improving the user experience using features such as user alerts, auto-complete and spell-check. Previous programming experience not required.
Posted: 18 Oct 2010 | Published: 18 Oct 2010

Lucid Works

Deploying Work Folders in a Virtual Storage Environment
sponsored by TechData - HPE
WHITE PAPER: In this white paper, learn about software that enables you to work on your files both on and offline, with an auto-sync feature to connect your files to the centralized server once it connects to the internet.
Posted: 21 Apr 2017 | Published: 31 Mar 2016

TechData - HPE

Policy-based Compliance Protects Enterprise Imaging and Printing Data
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This exclusive paper examines a policy-based imaging and printing compliance solution that can help your keep the critical data you print safe and secure.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

Hewlett-Packard Enterprise

The Five Critical SLA Questions
sponsored by IBM
WHITE PAPER: SLAs are critical tools that can help ensure appropriate performance. And the use of SLAs as part of the service delivery management process is on the rise. If you’re going to succeed, you’ll have to do your homework. This paper identifies the five critical steps you should take before you define your Service Level Agreements.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

IBM

Database Security: Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 07 Sep 2010 | Published: 07 Sep 2010

Imperva
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement