Hardware  >   Electronic Components  >  

Readouts

RSS Feed    Add to Google    Add to My Yahoo!
ReadoutsReports
 
Why threat intelligence is critical for next generation firewalls
sponsored by Dell Software
WHITE PAPER: A top-tier threat intelligence network is the foundation of an effective next-generation firewall (NGFW). This white paper examines three criteria for judging threat intelligence networks: completeness, accuracy and speed, and discusses how one such network works in practice.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

Making your business intelligence strategy a success
sponsored by IBM
EGUIDE: Business intelligence (BI) offers IT leaders the chance to achieve greater strategic decision-making through the use of dashboards, data analytics, reporting tools and much more. So how can IT leaders plan for a seamless BI deployment? Inside this e-guide, uncover expert tips that will help ensure long-term BI success.
Posted: 02 Dec 2011 | Published: 02 Dec 2011

IBM

Best Practices Guide: Cabling the Data Center
sponsored by Brocade
WHITE PAPER: This guide describes best practices for incorporating cabling in a typical data center, plus tips for selecting cabling components and information on data transmission media.
Posted: 01 Sep 2009 | Published: 01 Sep 2007

Brocade

Architecting the Right Stack for Your Enterprise
sponsored by Scalr
WHITE PAPER: In this white paper, explore the layered structure of technologies that make up the cloud, also known as the "cloud stack."
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Scalr

The Basics of Data Deduplication Solutions
sponsored by Dell Software
EGUIDE: This guide gives the basics of deduplication and focuses on how deduplication fits in with disaster recovery strategies. It also shows the advantages of hardware and software deduplication.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Dell Software

Best practices for data migration projects
sponsored by Bull
EGUIDE: This expert e-guide provides a ten step data center migration checklist to avoid potential risk, as well as expert advice on planning migration projects
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Bull

When 'Secure enough' isn't enough
sponsored by Imation Corp.
WHITE PAPER: This white paper explains the reason why compliance alone may not be enough to provide the security you need to prevent data breaches from occurring.
Posted: 24 Sep 2014 | Published: 01 Feb 2013

Imation Corp.

What You Need to Know About HP 5400R z12 Switch Series
sponsored by Hewlett-Packard Company
DATA SHEET: Uncover the specifics on an advanced, intelligent switch technology – HP 5400R z12 Switch Series.
Posted: 10 Sep 2014 | Published: 31 Jul 2014

Hewlett-Packard Company

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
sponsored by IBM
WHITE PAPER: This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
Posted: 12 May 2014 | Published: 31 Jan 2014

IBM

Case Study: KFC POS System Serves Great Service
sponsored by Toshiba
CASE STUDY: KFC, the global fast food chain, was upgrading to a new software platform, and they needed to upgrade its existing point-of-sale (POS) equipment that would support the new software regulations. In this brief case study, find out which POS system KFC ultimately chose, and discover the benefits they experienced from the hardware upgrade.
Posted: 09 May 2014 | Published: 31 Dec 2013

Toshiba
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement