Hardware  >   Computer Hardware  >  

Hosts

RSS Feed    Add to Google    Add to My Yahoo!
HostsReports
 
VMware vSphere Essentials
sponsored by Global Knowledge
WHITE PAPER: This white paper provides a review of essential information for IT administrators running VMware vSphere. Included are fundamentals concerning virtual machines, hypervisors, hosted solutions, and virtual hardware, as well as VMware solutions.
Posted: 12 Feb 2013 | Published: 12 Feb 2013

Global Knowledge

IBM Virtual Client Solution
sponsored by IBM Software Group
SOFTWARE DEMO: Find out how by combining the power of server virtualization with the flexibility of thin client devices, the IBM Virtual Client Solution can help to match end user needs with the right computing resources.
Posted: 28 Nov 2007 | Premiered: 28 Nov 2007

IBM Software Group

Red Hat Enterprise Virtualization for Desktops: Solution Guide
sponsored by Red Hat and JBoss
WHITE PAPER: The virtualization on x86 platforms has been a true game changer for desktop delivery. IT pros can now centrally manage, maintain, and enforce policies on desktops in ways never before possible with traditional desktops. This white paper explores the exact ways that the virtual desktop model can benefit companies.
Posted: 18 May 2011 | Published: 18 May 2011

Red Hat and JBoss

High Performance Mailrooms Cross the Finish Line First
sponsored by Perceptive Software
WEBCAST: Uncover the ins-and-outs of high performance digital mailrooms.
Posted: 03 Jul 2014 | Premiered: Dec 31, 2013

Perceptive Software

Driving Innovation in the Banking Industry: Cutting Edge Computing Platforms Make a Difference
sponsored by IBM
WHITE PAPER: Explore this informative white paper to find out how a fast, agile and resilient computing platform can propel your bank towards success.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

IBM

Five Easy Steps to Smarter Systems Imaging
sponsored by Dell and Microsoft
WHITE PAPER: This whitepaper takes you through 5 steps for developing a smarter approach to systems imaging that layers a unique set of drivers, updates, applications, configurations and user personality on top of the core configuration images.
Posted: 21 Mar 2014 | Published: 21 Mar 2014

Dell and Microsoft

KFC Serves Up Improved POS Transactions
sponsored by Toshiba
CASE STUDY: KFC, the global fast food chain, was upgrading to a new software platform, and they needed to upgrade its existing point-of-sale (POS) equipment that would support the new software regulations. In this brief case study, find out which POS system KFC ultimately chose, and discover the benefits they experienced from the hardware upgrade.
Posted: 09 May 2014 | Published: 31 Dec 2013

Toshiba

Reworking the Infrastructure for IT Efficiency
sponsored by IBM
WHITE PAPER: This whitepaper focuses on the ability of pre-integrated, pre-configured, and pre-optimized hardware platforms to help improve efficiency in modern data centers.
Posted: 12 Nov 2013 | Published: 31 Jul 2013

IBM

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

What can go wrong with counterfeit parts : What unauthorized support providers don't tell you - Government Finance customer
sponsored by Hewlett-Packard Company
CASE STUDY: Read through this concise case study to find out how HP resolved an organization's data loss issues, when it was discovered their hardware was not genuine HP parts.
Posted: 24 Jan 2014 | Published: 30 Nov 2013

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement