IT Systems  >   Communications Systems  >  

Enterprise Systems Hardware

RSS Feed   
Enterprise Systems Hardware Reports
 
Who, What & How of HTTP Security Headers
sponsored by TechTarget
RESOURCE: In our exclusive expert guide, Who, What & How of HTTP Security Headers, Judith Myerson outlines how to defend your websites using strong HTTP security headers. To claim your free PDF download, we ask that you participate in our multiple-choice survey.
Posted: 03 Mar 2018 | Published: 12 Jun 2019

TechTarget

Sun SPARC Enterprise M3000 Server Architecture
sponsored by Oracle Corporation
WHITE PAPER: Oracle’s Sun SPARC Enterprise servers are highly reliable, easy-to-manage, vertically scalable systems with all the benefits of traditional mainframes—without the associated cost, complexity, or vendor lock-in. In fact, the Sun SPARC Enterprise M-Series Servers deliver mainframe-class system architecture at open system prices.
Posted: 14 Mar 2011 | Published: 01 Apr 2010

Oracle Corporation

Next Gen IT and the Cloud
sponsored by ServiceNow
WHITE PAPER: This valuable resource examines how IT is losing control over the enterprise and the need for change in the world of IT, and explores how cloud-driven technology can help you more successfully manage IT services.
Posted: 24 Jul 2013 | Published: 24 Jul 2013

ServiceNow

Migrate Oracle Database Lite to Sybase SQL Anywhere
sponsored by Sybase, an SAP company
PODCAST: Oracle Database Lite Client, Branch Office and Web-to-Go have been removed from Oracle's technology price list and are no longer being actively developed.  Now you are faced with a migration project.
Posted: 31 Mar 2011 | Premiered: Mar 31, 2011

Sybase, an SAP company

The State of IT Systems Management
sponsored by Kaseya International Limited
WHITE PAPER: This white paper is the culmination of results from a survey conducted - which asked IT professionals about their priorities, concerns and goals regarding the dynamic world of IT systems management - painting a complete and accurate picture of the most common IT issues affecting IT professionals and Kaseya’s solution to solving these problems.
Posted: 29 Mar 2011 | Published: 29 Mar 2011

Kaseya International Limited

Computer Weekly: The Rise of Home Automation
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the latest developments in smart home technology and the opportunities it presents for businesses. Our new buyer's guide examines the options for setting up an enterprise app store. And we find out how in-store tracking technology could improve the retail experience for shoppers. Read the issue now.
Posted: 11 Aug 2014 | Published: 12 Aug 2014

ComputerWeekly.com

Supporting workplace mobility with ERP
sponsored by Sage (UK) Limited
WHITE PAPER: This white paper examines the business impact of mobile enterprise resource planning (ERP) and why mid-size organizations are flocking to this technology. Also inside, uncover key benefits and potential challenges of mobile ERP.
Posted: 20 Dec 2013 | Published: 31 Oct 2013

Sage (UK) Limited

E-Guide: Expert Tips for Monitoring Your VMware Environment
sponsored by Nimsoft, Inc.
EGUIDE: In this e-guide from SearchVMware.com, gain expert insight into the existing performance monitoring tools in vSphere for optimal virtual environment management. And discover five VMware administration and management tips that will help you better manage your VMs and avoid common mistakes.
Posted: 25 Mar 2011 | Published: 25 Mar 2011

Nimsoft, Inc.

Intel® Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms - Cloud On-Boarding with Citrix OpenCloud*
sponsored by Intel
WHITE PAPER: For enterprise IT professionals looking to move data, applications, or integrated solutions from the data center to the cloud, it is often useful to start with the knowledge and experience gained from previous work. This paper discusses on-boarding considerations, as well as the key software tools and applications to make the effort successful.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

Intel

Modernize Your Approach to Authentication
sponsored by SearchSecurity.com
EBOOK: This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences