IT Agents  >   Professional Organizations  >   Information Industry Professional Organizations  >   Virtual Communities  >  

eSIG

RSS Feed    Add to Google    Add to My Yahoo!
eSIG Reports
 
Configuration Management for Virtual and Cloud Infrastructures
sponsored by ComputerWeekly.com
WHITE PAPER: The top seven things to consider when managing configuration for virtual and cloud infrastructures.
Posted: 25 Oct 2011 | Published: 19 Jan 2011

ComputerWeekly.com

E-Guide: Run Antivirus Scans in Virtual Environments Without Compromising System Performance
sponsored by CA Technologies.
EGUIDE: This expert e-guide from SearchServerVirtualization.com explains considerations to keep in mind when planning antivirus scans in your virtual environment.
Posted: 15 Oct 2010 | Published: 15 Oct 2010

CA Technologies.

A Guide to Utilizing Virtualization in a Disaster Recovery Strategy
sponsored by Dell and Microsoft
EGUIDE: In this expert E-Guide, brought to you by SearchServerVirtualization.com and Dell, you will discover the steps essential for effectively integrating server virtualization into your disaster recovery strategy.
Posted: 20 Apr 2009 | Published: 20 Apr 2009

Dell and Microsoft

The Virtual Office Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.

Oxilion Deploys Red Hat Enterprise Virtualization to Keep Customers Satisfied
sponsored by Red Hat.
WHITE PAPER: Access this white paper to discover a new virtualization platform with cloud capabilities that delivers flexibility, scalability and cost requirements to virtual data centers.
Posted: 16 May 2011 | Published: 16 May 2011

Red Hat.

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

CA Automation Suite Paves the Way for Cloud
sponsored by CA Technologies
WHITE PAPER: This white paper describes how virtualisation and cloud initiatives are creating new types of management challenges across physical and virtual data centre environments. Continue reading to learn more.
Posted: 13 Dec 2010 | Published: 01 Oct 2010

CA Technologies

The CISO's Guide to Virtualization Security
sponsored by Rapid7
WHITE PAPER: Security incidents that occur in a virtual environment can cause significant, sometimes crippling damage to businesses. It's essential that security professionals outline their efforts and making securing virtual infrastructure a priority.
Posted: 18 Jul 2012 | Published: 12 Jan 2012


Content-Aware Identity & Access Management in a Virtual Environment
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage. 
Posted: 22 Sep 2010 | Published: 01 Jun 2010

CA Technologies.

Magic Quadrant for Team Collaboration and Social Software, 2007
sponsored by Socialtext
WHITE PAPER: The collaboration support market is being revitalized, with buyers and sellers looking to add social interaction in the context of broad collaboration support. Read this Gartner white paper which discusses new and established vendors in this market...
Posted: 05 Dec 2007 | Published: 24 Oct 2007

Socialtext
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement