Software  >   Systems Software  >   Operating Systems  >   PC Operating Systems  >  

Disk Operating System

RSS Feed    Add to Google    Add to My Yahoo!
Disk Operating System Reports
 
How to Meet the Needs of a Converged Network
sponsored by Extreme Networks
WHITE PAPER: This informative white paper discusses the needs of a converged network and introduces a network operating system that might meet them.
Posted: 16 Feb 2015 | Published: 31 Dec 2014

Extreme Networks

Uncover the Top Ten Database Threats That Could Affect Your Business
sponsored by Imperva
WHITE PAPER: This white paper highlights the top ten threats that affect traditional databases as well as Big Data technologies.
Posted: 03 Mar 2015 | Published: 31 Dec 2014

Imperva

Evolving Security Technologies Present New Opportunities for Businesses
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EGUIDE: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com

Distributed Object Store Principles of Operation: The Case for Intelligent Storage
sponsored by Hitachi Data Systems
WHITE PAPER: This resource explores the growth of distributed object stores (DOS) and examines the underlying mechanisms that guide their use and development.
Posted: 16 Feb 2012 | Published: 16 Feb 2012

Hitachi Data Systems

Threat Analysis: Understanding and Combating DDoS Attacks
sponsored by Dell SecureWorks
WHITE PAPER: This analysis focuses on the types of attacks generally referred to as distributed denial-of-service, or DDoS, attacks. DDoS attacks are most often used to extort or damage businesses whose websites or online assets are a major source of revenue, are an indicator of brand value, or are critical to operations.
Posted: 31 May 2011 | Published: 31 May 2011

Dell SecureWorks

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

The Casper Suite from JAMF Software - For Business
sponsored by JAMF Software
WHITE PAPER: No platform offers better security or delivers a more productive user experience than Apple. And no tool manages Apple devicesbetter than the Casper Suite. View this resource to leran more about the software and the additional value it can provide your business.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

JAMF Software

Capacity and performance benefits of SAN storage systems
sponsored by Dell, Inc. and Intel®
EGUIDE: In this e-guide, learn about the anticipated year-over-year capacity growth of 24% and the need to boost the performance of existing applications that is driving new SAN storage systems. Rich Castagna, VP of TechTarget's storage media editorial group, reveals top drivers for SAN array purchases, which flavor of SAN is the most preferred, and more.
Posted: 25 Mar 2015 | Published: 25 Mar 2015

Dell, Inc. and Intel®

Dell gives NetVault Backup a facelift, adds enterprise DR disk
sponsored by Dell, Inc. and Intel®
EGUIDE: This e-guide describes this addition in depth, noting that the DR6000 enterprise disk target has more than twice the capacity of the vendor's midrange appliance and has new software for accelerating source-side dedupe for files.
Posted: 25 Mar 2015 | Published: 25 Mar 2015

Dell, Inc. and Intel®
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement