Software  >   Systems Software  >   Operating Systems  >   PC Operating Systems  >  

Disk Operating System

RSS Feed    Add to Google    Add to My Yahoo!
Disk Operating System Reports
 
Evolving Security Technologies Present New Opportunities for Businesses
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

Distributed Object Store Principles of Operation: The Case for Intelligent Storage
sponsored by Hitachi Data Systems
WHITE PAPER: This resource explores the growth of distributed object stores (DOS) and examines the underlying mechanisms that guide their use and development.
Posted: 16 Feb 2012 | Published: 16 Feb 2012

Hitachi Data Systems

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com

Threat Analysis: Understanding and Combating DDoS Attacks
sponsored by Dell SecureWorks
WHITE PAPER: This analysis focuses on the types of attacks generally referred to as distributed denial-of-service, or DDoS, attacks. DDoS attacks are most often used to extort or damage businesses whose websites or online assets are a major source of revenue, are an indicator of brand value, or are critical to operations.
Posted: 31 May 2011 | Published: 31 May 2011

Dell SecureWorks

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Enable Rapid IT Service Delivery and Innovation with an Infrastructure Built for Cloud-Native Applications
sponsored by Red Hat
WHITE PAPER: This web book explores the cloud infrastructure and tools required to support agile IT methods and applications, and demonstrates why open source technology is the best way to achieve the full benefits of this new, rapid mode of IT service delivery. Learn how innovative applications propelled by IT can create entirely new revenue streams.
Posted: 13 Jan 2016 | Published: 13 Jan 2016

Red Hat

Desktops as a Service: Everything You Need to Know About DaaS & Hosted VDI Chapter 14: Client Devices and BYOD
sponsored by Dell, Inc.
EBOOK: This chapter of Brian Madden's e-book, Desktops as a Service: Everything You Need to Know about DaaS & Hosted VDI, details the various factors IT administrators must consider with respect to client and mobile devices. Explore DaaS client options as well as how to assess your mobile needs to select the "right" client device.
Posted: 21 Mar 2016 | Published: 21 Nov 2014

Dell, Inc.

Thinking Outside the Container: How to Overcome MDM Limitations
sponsored by Matrix42
WHITE PAPER: In this white paper, you will discover how to overcome the limitations of current container-based MDM/MAM solutions. Access this paper to implement MAM/MDM solutions that don't contain the user and constrain the benefits of mobility, and which empower the user by enabling the new capabilities found in the native mobile OS.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

Matrix42

Data Modeling for Application Development: Get the Most out of Your Data
sponsored by ERwin
EGUIDE: This two-part expert guide discusses why data modeling is an essential part of all app development projects. Inside, access a Q&A session with data modeling expert Steve Hoberman, who explains how to overcome the biggest challenges that businesses face in creating a data model.
Posted: 12 Apr 2016 | Published: 07 Apr 2016

ERwin

Computer Weekly – 9 February 2016: How Software Protects People
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how software is helping to maintain safety in high-risk sectors such as oil and gas, aerospace and healthcare. We offer six tips from CIOs for innovation with data. And we examine the continuing threat to businesses from denial of service cyber attacks. Read the issue now.
Posted: 05 Feb 2016 | Published: 09 Feb 2016

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement