Software  >   Systems Software  >   Utility Software  >   File Management Programs  >  

Copy Programs

RSS Feed    Add to Google    Add to My Yahoo!
Copy ProgramsReports
 
File Server Migration: Pain is in permissions
sponsored by Dell Software
WHITE PAPER: Access this white paper to discover a three-phase approach to easily fixing problematic file permissions and securely migrating files even in the most complex environments.
Posted: 29 Aug 2012 | Published: 29 Aug 2012

Dell Software

Software License Optimization with 1E AppClarity
sponsored by 1e Inc
WHITE PAPER: This exclusive whitepaper reveals the results of a study on software licensing waste.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

1e Inc

Take Inventory of your Open Source Software Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why enterprise development teams should create in-house repositories to mitigate the risks of applications built on open source code.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Best practices for data migration projects
sponsored by Bull
EGUIDE: This expert e-guide provides a ten step data center migration checklist to avoid potential risk, as well as expert advice on planning migration projects
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Bull

Deploy DevOps in Your Traditional Environment with Configuration Management Processes
sponsored by Red Hat
WEBCAST: Many companies are implementing new tactics and methodologies to help reduce their time to market and improve overall software quality. View this webcast now to learn how to implement DevOps for Java EE applications in a traditional, non-PaaS environment.
Posted: 06 Oct 2014 | Premiered: Oct 6, 2014

Red Hat

Update Your Application Security Policy After Heartbleed
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why relying solely on other parties to correctly implement and deliver software security can put enterprise and customer data at risk.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Quality in the Cloud: Best Practices for ISVs
sponsored by Equinix
WHITE PAPER: Access this white paper to learn how ISVs can partner with hosting companies, establish criteria for selecting a hosting service, and get metrics for measuring hosting performance as it relates to cloud services. You'll get insight into how you can prepare to enter into the cloud market quickly and confidently.
Posted: 05 Nov 2014 | Published: 31 Dec 2011

Equinix

APM SaaS and Analytics Step Up to Meet the Needs of Modern Applications, Mobile Users, and Hybrid Cloud Architectures
sponsored by IBM
WHITE PAPER: This white paper examines the critical role that SaaS and analytics are playing in the transformation of the APM market.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

IBM

Software Asset Management (SAM) 101
sponsored by CDW Corporation
VIDEO: CDW offers consulting for software asset management to avoid or reconcile licensing issues. Watch this informative video to learn how launching a CDW partner's tool, Snow Software, allows administrators to see which tools are in use and can then meet with a CDW account executive to plan a licensing program.
Posted: 21 Oct 2014 | Premiered: 30 Sep 2014

CDW Corporation

The Total Economic Impact Of Business Analytics On IBM Power Systems
sponsored by IBM
CASE STUDY: Forrester Consulting group compiled this case study reviewing IBM Business Analytics on IBM Power System servers to give you a reference and starting point for software to choose.
Posted: 23 Oct 2014 | Published: 31 Mar 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement