Software  >   Systems Software  >   Server Software  >   Server Virtualization Software  >  

Virtual Iron

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Virtualization software to fully support Intel-VT and AMD-V hardware assisted virtualization.
Virtual IronReports
51 - 75 of 990 Matches Previous Page  | Next Page
An In-Depth Guide to Server Virtualization with Windows Server Hyper-V and System Center
sponsored by Veeam Software
WHITE PAPER: Explore this in-depth e-guide to learn everything you need to know about server virtualization with Windows Server Hyper-V and System Center.
Posted: 09 Jun 2014 | Published: 29 May 2014

Veeam Software

Analysit Fact Sheet: Who’s Minding your Cloud?
sponsored by CA Technologies.
ANALYST BRIEF: 46% of companies have stopped or slowed adoption of cloud services due to security concerns. View this analyst fact sheet to learn more about how companies are handling software, application, and cloud security.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

CA Technologies.

Analyst's take: Force.com application drives faster development
sponsored by ComputerWeekly.com
WHITE PAPER: Nucleus analyzed existing Force.com application deployments and found an average of 4.9 times faster development.  End customers, developers, and ISVs experience more rapid time to value, lower cost, and greater ongoing flexibility.
Posted: 21 Oct 2011 | Published: 18 Feb 2011

ComputerWeekly.com

Application Deployment and Release: Technology Coordinates All Moving Parts
sponsored by Automic
WHITE PAPER: Application releases now span every department of the business, and require a significant amount of effort to coordinate. This whitepaper considers technology that automates application releases, and the benefits seen by companies that have implemented a solution like this one.
Posted: 15 Sep 2014 | Published: 15 Sep 2014

Automic

Application Portfolio Management: Treat Software as a Valuable Asset
sponsored by Innotas
EGUIDE: This e-guide explains how application portfolio management (APM) allows organizations to oversee the applications that run their business, helping to ensure efficient and accurate inventory.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

Innotas

Are You Prepared for a Software Audit?
sponsored by CDW Corporation
WHITE PAPER: Access this white paper to uncover the key elements of a software End User License Agreements (EULA) audit. Click through to explore 5 ways software asset management (SAM) can help you ensure compliance.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

CDW Corporation

Aligning Server Options with Business Needs
sponsored by HP & Intel®
EGUIDE: This e-guide offers expert tips for gaining a clear understanding of how midmarket CIOs can effectively align server requirements with business needs. That way, you'll be able to easily distinguish what you want with what is necessary for the future success of your business.
Posted: 11 Dec 2012 | Published: 11 Dec 2012

HP & Intel®

AMD Opteron 6000 Series Platform and Microsoft Windows Server 2008 R2 Platform for Next Generation of Smart IT
sponsored by AMD
DATA SHEET: AMD Opteron processors together with Microsoft Windows Server 2008 R2 featuring Hyper-V deliver the power, performance and value needed for the next generation of data centers. The new AMD Opteron 6000 Series platform and virtualization technologies from Microsoft address three key data center trends directly. Read this data sheet for more.
Posted: 30 Aug 2010 | Published: 27 Jul 2010

AMD

An Introduction to Sharepoint 2010
sponsored by Dell, Inc.
WHITE PAPER: This paper provides an overview of common business use cases for which SharePoint is a good fit, introduces the services and functionality within SharePoint Server 2010, highlights key changes from MOSS 2007, and helps readers understand the terminology and concepts needed for planning or deploying a SharePoint 2010 farm.
Posted: 15 Jun 2011 | Published: 15 Jun 2011

Dell, Inc.

An Introduction to Virtualization
sponsored by VMware and Intel
PRODUCT OVERVIEW: Virtualization technology provides a scalable and cost-effective way to optimize the use of your current technology assets, increase the productivity of your IT staff and protect the data and IT environments that run your business.
Posted: 15 Nov 2007 | Published: 01 Nov 2007

VMware and Intel

Analysis: High-Performance Application-centric Storage For Virtualization and Consolidation
sponsored by Xiotech Corporation
WHITE PAPER: The Xiotech Emprise 5000 storage device and its foundation component, the Xiotech Intelligent Storage Element (ISE), are designed to redefine the construct of a storage foundation building block. The idea is to provide a storage target that delivers application-specific requirements, such as I/O operations per second (IOPS). Read more!
Posted: 02 Jun 2010 | Published: 01 Mar 2010

Xiotech Corporation

Analyst Report: Forrester - Product innovation demands more flexible software delivery
sponsored by IBM
ANALYST REPORT: In September 2010, the IBM Corporation commissioned the Forrester Consulting group to conduct a study whose aim was to better understand the critical role software innovation plays in product development. Download the report to see the results.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

IBM

Analyst: Gartner Report - Magic Quadrant for Integrated Quality Suite
sponsored by IBM
ANALYST REPORT: According to Gartner, vendors must demonstrate both "completeness of vision" and an "ability to execute" to be evaluated as a leader. Gartner's 2011 Magic Quadrant for Integrated Software Quality Suites evaluates IBM as a leader. Read the report to learn more.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

IBM

AppDynamics Lite
sponsored by AppDynamics
TRIAL SOFTWARE: AppDynamics Lite troubleshoots java performance problems in production environments. It organizes an application into business transactions, helping identify slow, stalled, and failed transactions. The application is free. Download now.
Posted: 28 Jul 2010 | Premiered: 16 Jul 2010

AppDynamics

Application Performance Management (APM) for TIBCO Users: Extending Visibility across Your TIBCO Infrastructure and Beyond
sponsored by SL Corporation
WHITE PAPER: TIBCO users may wish to expand IT monitoring and management beyond their TIBCO infrastructure.
Posted: 31 Oct 2008 | Published: 31 Oct 2008

SL Corporation

Applying Security Holistically from the Cloud
sponsored by CloudAccess
WHITE PAPER: Consult this informative white paper to learn how the paradigm has shifted to security that's developed, deployed and managed from the cloud. Learn how to implement a holistic security strategy to protect all data in the enterprise.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

CloudAccess

Applying Updates for Dell PowerEdge Servers Using Microsoft Systems Management Server 2003 Part 1
sponsored by Dell, Inc.
WHITE PAPER: Managing hardware updates is a key aspect of the MS Systems Management Server (SMS) 2003 with the introduction of the SMS 2003 Inventory Tool for Dell Update. This article provides guidelines for the process and is the first segment of a two part series.
Posted: 27 Jul 2006 | Published: 01 Jul 2006

Dell, Inc.

Applying Updates for Dell PowerEdge Servers Using Microsoft Systems Management Server 2003 Part 2
sponsored by Dell, Inc.
WHITE PAPER: Managing hardware updates is a key aspect of the MS Systems Management Server (SMS) 2003 with the introduction of the SMS 2003 Inventory Tool for Dell Update. This article provides guidelines for the process and is the final segment of a two part series.
Posted: 27 Jul 2006 | Published: 01 Jul 2006

Dell, Inc.

Are you Agile Enough?
sponsored by IBM
WEBCAST: If you are using Open Source, doing Agile but not able to consistently meet project goals, and aren't sure what tools you need -- check out how Rational Team Concert can help. See how Rational Team Concert automates core Agile practices -- like consistent team collaboration, rapid response to change, and frequent delivery of [...]
Posted: 09 Sep 2009 | Premiered: Sep 9, 2009

IBM

ASG's metaCMDB™ Master or "Citizen" CMDB Containing Critical Enterprise Configuration Information
sponsored by ASG Software Solutions
WHITE PAPER: The sound understanding and visibility of configuration information provided by ASG’s metaCMDB™ is critical for ITIL initiatives and business service management (BSM) implementations, service desk support, and the integration of disparate technologies. Read this paper to find out more.
Posted: 25 May 2010 | Published: 25 May 2010

ASG Software Solutions

Assuring Software Security Through Testing
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

(ISC)2 UK Ltd

Attachment Spam - The Latest Trend
sponsored by GFI Software
WHITE PAPER: This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software.
Posted: 18 Mar 2008 | Published: 01 Jan 2007

GFI Software

Auto-Snapshot Manager/ VMware® Edition: Automated, Integrated, And Scalable Protection Of Virtual Machines
sponsored by Dell, Inc.
PRODUCT LITERATURE: Auto-Snapshot Manager/VMware Edition (ASM/VE) is a unique and innovative data protection feature of the Dell EqualLogic™ PS Series iSCSI SAN that enables fast online backups and quick restores of VMware virtual machines and VMFS file systems.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

Dell, Inc.

Automating System i Message and Resource Management
sponsored by Help/Systems
WHITE PAPER: Automated, centralized message control and resource monitoring can help you manage your System i more easily and with fewer staff. This white paper describes some of the tasks you’ll face, some tips to help you get started, and the benefits of automating your system management with Robot/CONSOLE.
Posted: 25 May 2010 | Published: 25 May 2010

Help/Systems

Automating Your Code Review: Moving to a SaaS Model for Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security.
Posted: 07 Jun 2010 | Published: 10 Feb 2009

Veracode, Inc.
51 - 75 of 990 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement