Software  >   Systems Software  >   Operating Systems  >   PC Operating Systems  >  

Disk Operating System

RSS Feed    Add to Google    Add to My Yahoo!
Disk Operating SystemReports
 
Is Your Data Center Ready for Today’s DDoS Threats?
sponsored by Fortinet, Inc.
VIDEO: This webinar gives a description of distributed denial-of-services attacks and explains the benefits of a DDoS mitigation solution.
Posted: 30 Jul 2014 | Premiered: 17 Apr 2014

Fortinet, Inc.

Threat Analysis: Understanding and Combating DDoS Attacks
sponsored by Dell SecureWorks
WHITE PAPER: This analysis focuses on the types of attacks generally referred to as distributed denial-of-service, or DDoS, attacks. DDoS attacks are most often used to extort or damage businesses whose websites or online assets are a major source of revenue, are an indicator of brand value, or are critical to operations.
Posted: 31 May 2011 | Published: 31 May 2011

Dell SecureWorks

Distributed Object Store Principles of Operation: The Case for Intelligent Storage
sponsored by Hitachi Data Systems
WHITE PAPER: This resource explores the growth of distributed object stores (DOS) and examines the underlying mechanisms that guide their use and development.
Posted: 16 Feb 2012 | Published: 16 Feb 2012

Hitachi Data Systems

Redefining the Economics of Storage Analyst Report
sponsored by Dell and VMware
WHITE PAPER: This white paper explains how to assess the potential impact of new storage solutions. It also explains how a storage approach that combines the latest storage software with solid state hardware allows users to consolidate, standardize, and automate storage.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Dell and VMware

Mobile Access to Your BC/DR Plans
sponsored by RSA, The Security Division of EMC
VIDEO: Watch to discover how the RSA Archer Business Continuity Management Mobile application enables users to view business-continuity or disaster-recovery plans and associated strategies, tasks, calling trees, and requirements from their Apple iOS device.
Posted: 03 Sep 2014 | Premiered: 03 Sep 2014

RSA, The Security Division of EMC

CW Special Report on IBM
sponsored by ComputerWeekly.com
IT BRIEFING: This special 12-page report from Computer Weekly analyses the challenges facing IBM, its financial performance, the services it offers, its place in the IT market and its future strategy..
Posted: 15 Aug 2014 | Published: 15 Aug 2014

ComputerWeekly.com

Drive a New Open Networking Environment
sponsored by Dell, Inc.
VIDEO: Access this brief video to learn how you can speed innovation by implementing standards-based networking equipment, operating systems, and applications based on your unique requirements.
Posted: 11 Sep 2014 | Premiered: 11 Sep 2014

Dell, Inc.

Symantec Backup Exec™ 2014 Data Sheet: Backup and Disaster Recovery
sponsored by Symantec Corporation
DATA SHEET: Access this data sheet to find out about a radically faster backup and recovery with innovative virtualization capabilities.
Posted: 22 Sep 2014 | Published: 31 May 2014

Symantec Corporation

Managing the Software Supply Chain
sponsored by IBM
WHITE PAPER: Find out how your organization should address the risk in managing the software supply chain.
Posted: 07 Aug 2014 | Published: 30 Sep 2013

IBM

ROI Assessment Tool: Assess the Value of Deployment Automation
sponsored by IBM
ASSESSMENT TOOL: Software deployment automation can notably accelerate project lifecycle timeframes and reduce the number of errors that need to be addressed during development. Use this tool to receive a targeted analysis of your needs, and find out what ROI your organization can expect from deployment automation.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement