Software  >   Systems Software  >  

System Utilities

RSS Feed    Add to Google    Add to My Yahoo!
System Utilities Reports
 
A case study in critical infrastructure interdependency
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series provides a short introduction to Critical Infrastructure Protection.
Posted: 01 Sep 2016 | Published: 02 Sep 2016

ComputerWeekly.com

Is Utility Hosting Right For Your Business?
sponsored by AT&T Corp
WHITE PAPER: Compared to dedicated hosting, utility hosting is easily scalable and standardized as a turnkey package. Its chief advantage is that you pay only for the computing capacity that you use. A good time to adopt this solution is when change is taking place.
Posted: 04 Aug 2010 | Published: 04 Aug 2010

AT&T Corp

Building your road map to cloud
sponsored by Hewlett Packard Enterprise
PODCAST: Many organizations understand the core benefits of the cloud, but there remains a level of uncertainty about how to begin to leverage cloud. We help organizations plan their cloud strategy.
Posted: 04 Apr 2011 | Premiered: Apr 4, 2011

Hewlett Packard Enterprise

Chapter 3: SaaS on the Rise, but Does It Deliver?
sponsored by SearchCRM
EBOOK: The emergence of Software as a Service-based applications has enabled organizations to get new applications up and running quickly and cheaply, saving resources for mission-critical tasks.
Posted: 07 Oct 2009 | Published: 07 Oct 2009

SearchCRM

Effective print security for SMBs
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Louella Fernandes and Clive Longbottom  discuss how integrated print management provides SMBs with a simple and scalable approach for print security.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

ComputerWeekly.com

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

How Peer-to-Peer File Sharing Impacts Vendor Risk and Security Benchmarking
sponsored by BitSight
WHITE PAPER: File sharing is a prevalent problem on corporate networks today. Access this report and you will learn which industries excel in mitigating the risks of file sharing, how P2P file sharing activity impacts security ratings and more.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

BitSight

Digital transformation: bridging the paper and digital gap
sponsored by ComputerWeekly.com
ANALYST REPORT: Enterprises are increasingly turning to traditional managed print service providers to improve process efficiency across both paper and digital information, says this report from analyst group, Quocirca.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

ComputerWeekly.com

Streamline, Speed and Secure the Supply Chain With Managed File Transfer
sponsored by SEEBURGER
WHITE PAPER: Your enterprise has invested heavily in SAP. But data exchange restrictions caused by large data files, FTP spaghetti and unreliable network connections create long waits, limit your ability to send and receive information, and raise costs and risks. Read this paper to find out how Managed File Transfer ensures your data flow is secure and speedy.
Posted: 24 Feb 2012 | Published: 31 Dec 2011

SEEBURGER

A File System for Today's Needs
sponsored by IBM
WEBCAST: In this video, learn about a clustered file system developed with today's needs in mind.
Posted: 01 Apr 2015 | Premiered: Apr 1, 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement