Emerging Technologies  >  

Micro Electro-mechanical Devices

RSS Feed   
Micro Electro-mechanical Devices White Papers (View All Report Types)
 
The Future of Work Is Now
sponsored by Citrix Online Go To Meeting
WHITE PAPER: This whitepaper will help you learn about the workplace today, the people in it, and the trends they are driving that you need to know about.
Posted: 10 Jun 2013 | Published: 10 Jun 2013

Citrix Online Go To Meeting

Cloud Backup and Recovery
sponsored by Vision Solutions
WHITE PAPER: The right way to evaluate the quality of your system and data protection is to evaluate the Recovery Time Objective (RTO) and Recovery Point Objective (RPO). These metrics define how long you think it will take you to get back online and how current the data has to be. Read this white paper to learn more.
Posted: 28 Sep 2010 | Published: 28 Sep 2010

Vision Solutions

The Economic Evolution of Enterprise Storage
sponsored by Hitachi Vantara
WHITE PAPER: The latest technologies innovations provide a big, evolutionary stride in economically superior storage designed to swiftly address mounting data challenges and changing business demands. With 3D scaling and dynamic tiering, IT leaders can dynamically scale up, scale out and scale deep for increased performance and scalability.
Posted: 02 Dec 2010 | Published: 02 Dec 2010

Hitachi Vantara

Building Your Backup and Disaster Recovery Plan 101
sponsored by StorageCraft Technology Corporation
WHITE PAPER: Small and medium businesses cannot afford to lose access for their data. Research shows that even brief server failures lead most smaller businesses to shut their doors for good. In light of this, any business should develop a workable backup and disaster recovery plan.
Posted: 04 Jul 2011 | Published: 30 Jun 2011

StorageCraft Technology Corporation

How Micro-Electro-Mechanical systems are taking over mobile devices
sponsored by ComputerWeekly.com
ANALYST BRIEF: In this report extract Juniper Research looks at the growing use of MEMS (micro-electro-mechanical systems) in mobile devices, tables, laptops and notebooks.
Posted: 23 Apr 2012 | Published: 06 Feb 2012

ComputerWeekly.com

SDN Integration: Centralized vs. Decentralized SDN Architecture
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchSDN.com outlines the differences between distributed and centralized SDN architecture models to help you decide which would be best to deploy in your organization.
Posted: 17 May 2013 | Published: 17 May 2013

SearchSecurity.com

Strategies to Capture Greater Value from Systems Engineering
sponsored by IBM
WHITE PAPER: Access this helpful white paper to learn how you can capture greater value from systems engineering by embracing a more holistic approach to manage complexity in both product and process.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

IBM

CW Special report on Wipro
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

CW Europe – June-August 2019: Why are Dutch companies slow to take up the advantages of IoT?
sponsored by ComputerWeekly.com
EZINE: Rapid adoption of the latest technologies is not only being encouraged by governments, but driven by them. Being the first country to set up the ideal environment for a new technology has huge economic advantages.
Posted: 13 Jun 2019 | Published: 13 Jun 2019

ComputerWeekly.com

BPM Adoption Patterns & Practices in Industry
sponsored by Oracle Corporation UK Ltd
WEBCAST: Watch this webcast to learn how organizations in the financial services, communications, utilities, and retail industries are adopting business process management (BPM) software and using best practices to address their pertinent process challenges to deliver relevant business value.
Posted: 07 Sep 2012 | Premiered: Sep 7, 2012

Oracle Corporation UK Ltd

BPM Patterns & Practices in Industry
sponsored by Oracle India Pvt. Ltd
WHITE PAPER: This paper reviews common BPM adoption patterns and best-practices across different industries to illustrate the value of BPM.
Posted: 31 May 2013 | Published: 25 Jun 2012

Oracle India Pvt. Ltd

BPM Patterns and Practices in Industry
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This paper reviews common BPM adoption patterns and best-practices across different industries to illustrate the value of BPM.
Posted: 18 Sep 2012 | Published: 18 Sep 2012

Oracle Corporation UK Ltd

E-Guide: Key Grounding and Voltage Considerations In the Data Center
sponsored by Schneider Electric
EGUIDE: This e-guide explains the reasons for implementing grounding methods and the problems that can occur if it is done incorrectly. Find out how to design your data center’s power system with key components in mind and how much power to implement in your data center.
Posted: 31 Jan 2011 | Published: 28 Jan 2011

Schneider Electric

Endpoint Protection
sponsored by Malwarebytes
WHITE PAPER: Networks are expanding to include remote devices that exist outside of the traditional perimeter, and organizations require modern endpoint security services. In this white paper, uncover the results from Info-Tech’s Data Quadrant Report on endpoint security to ensure your organization is equipped to make an informed buying decision.
Posted: 17 Jan 2020 | Published: 30 Jun 2019

Malwarebytes

The Art of Zero Day Threat Coverage
sponsored by Trend Micro
EBOOK: When it comes to network security, what you don’t know can hurt you in the form of unknown and undisclosed threats. Download this e-book to learn about the 3 different types of zero-day threats and how to protect your network from them.
Posted: 11 Mar 2020 | Published: 11 Mar 2020

Trend Micro

CW+: Mobile payments market opportunities for business
sponsored by ComputerWeekly.com
WHITE PAPER: The definition of a mobile payment is often open to interpretation and can differ from source to source.    Juniper Research has a simple definition of a mobile payment as “payment for goods or services with a mobile device such as a phone, Personal Digital Assistant (PDA), or other such device.”
Posted: 21 Oct 2011 | Published: 20 Dec 2010

ComputerWeekly.com

Three Types of Edge Computing Environments and their Impact on Physical Infrastructure Selection
sponsored by Schneider Electric
WHITE PAPER: Depending on the environment in which they are deployed, edge deployments may be susceptible to variable conditions like humidity, security, and others that require additional planning. Inside, learn about the three classifications of micro data center environments their accompanying physical infrastructure best practices.
Posted: 20 May 2020 | Published: 20 May 2020

Schneider Electric

Using Zero Trust to Enable Secure Remote Access
sponsored by BlackBerry
WHITE PAPER: As organizations continue to implement zero trust technologies, it’s critical to keep in mind that achieving an effective zero trust access control posture requires careful coordination and organization-wide buy-in. This SANS white paper offers additional expertise, including common challenges and key elements to consider.
Posted: 16 Jun 2020 | Published: 16 Jun 2020

BlackBerry

ESG XDR Paper: Beyond EDR
sponsored by Trend Micro
WHITE PAPER: 76% of companies feel that threat detection and response is more difficult today than it was 2 years ago. SIEM approaches are becoming too costly, and EDR tools aren’t a standalone option. So, what options, if any, do organizations have? Read on to learn more.
Posted: 23 Jan 2020 | Published: 31 Aug 2019

Trend Micro

Securing Virtualised DataCentres
sponsored by Trend Micro
EBOOK: Access this e-book to gain insight on securing a virtualised environment. Discover how to tackle virtualisation security issues and set the foundation to move confidently to the cloud.
Posted: 15 May 2011 | Published: 11 May 2011

Trend Micro

Securing Virtualized Data Centers
sponsored by Trend Micro, Inc.
EBOOK: On the surface, virtualized datacenters appear to have all of the same vulnerabilities and security challenges as conventional datacenters. With virtual machines, new challenges minimize the effectiveness of traditional protections. Read on to learn what it takes to secure today’s virtualized data centers.
Posted: 14 Dec 2009 | Published: 14 Dec 2009

Trend Micro, Inc.

Why APIs Are Different Than Integration
sponsored by Apigee
WHITE PAPER: In this eBook, we explore API-centric architecture in detail, and examine some of the important implications of this shift for enterprise application development today.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Apigee

The Sprawling Reach of Complex Threats
sponsored by Trend Micro
WHITE PAPER: Download Trend Micro’s latest annual security roundup for a deep dive into the most important issues that shaped the threat landscape of 2019. Learn how you can protect your organization from threats such as ransomware, supply chain attacks, and more.
Posted: 27 Feb 2020 | Published: 27 Feb 2020

Trend Micro

The New Norm: Trend Micro Security Predictions for 2020
sponsored by Trend Micro
WHITE PAPER: Industry experts at Trend Micro recently conducted research into past cybersecurity trends to develop their predictions for ever-evolving landscape of cybersecurity threats and defense methods in 2020 and beyond. Continue to read the full report.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

Trend Micro

Cost Benefit Analysis of Edge Micro Data Center Deployments
sponsored by Schneider Electric
WHITE PAPER: The ways digital services are being consumed is forcing us to adjust our data center deployment. The key is distributing micro data centers to support edge computing. Do yourself a favor and read this white paper as it dives deep into what may very well be the first big step in the future of data center management.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Schneider Electric

Solving Edge Computing Infrastructure Challenges
sponsored by Schneider Electric
WHITE PAPER: Jump inside this white paper to learn about a new, emerging edge computing data center assembly model that properly factors in the unique challenges posed by networking and installation at the edge.
Posted: 20 May 2020 | Published: 20 May 2020

Schneider Electric

Osterman Research: Focusing on the Endpoint as a Key Element of Your Security Infrastructure
sponsored by Trend Micro
WHITE PAPER: In the past, endpoints sat behind a network perimeter, but the growth of remote access to corporate resources makes the endpoint the new perimeter. Phishing, ransomware, malware, and web downloads are all potential threats. Delve into this Osterman Research report to get an in-depth look at these threats and how you can protect against them.
Posted: 26 Jun 2020 | Published: 30 Apr 2020

Trend Micro

Securing Office 365 Email with Isolation
sponsored by Menlo Security
EBOOK: An isolation platform can address many of the gaps in email and web security, that are currently left unaddressed by attackers in Office 365. Read on to learn about the benefits of an isolation platform and how it can help protect users from web-borne malware attacks via drive-by downloads, watering-hole attacks, malvertising, and much more.
Posted: 05 Jun 2019 | Published: 05 Jun 2019

Menlo Security

Why zero trust is IT security's best hope
sponsored by ComputerWeekly.com
EGUIDE: This guide provides both overarching advice and specific guidance on how to deal with particular issues, including cloud and legacy tools, app development and more. Learn the ideas and approaches that underpin zero trust, and also get solid ideas on where to begin to make it a reality.
Posted: 21 Feb 2020 | Published: 21 Feb 2020

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info