• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

deployment

Results 1451 - 1475 of 1589Sort Results By: Published Date | Title | Company Name
By: LANDesk     Published Date: Jun 07, 2010
Windows 7 adoption is one of IT's top priorities for 2010. A solid adoption strategy requires 12 to 18 months for thorough planning and testing before actual Windows 7 deployment can begin. But nearly two-thirds of companies don't yet have a Windows 7 adoption plan in place. In this White Paper LANDesk have identified seven pitfalls that IT organizations must avoid as they embark on Windows 7 adoption.
Tags : 
avocent, landesk, windows 7, microsoft, windows, vista, support, sp2, sp3, support, productivity, project management, service management, desktop management
    
LANDesk
By: Pillar Data Systems     Published Date: Apr 20, 2010
The most critical component of an Exchange deployment is the storage subsystem where the data is held. Download this white paper to learn best practices in storage sizing and deployment.
Tags : 
pillar data systems, microsoft exchange best practices, storage size, exchange deployment, virtualization, storage configuration, data priority, storage virtualization, best practices, server virtualization, microsoft exchange, configuration management
    
Pillar Data Systems
By: Pillar Data Systems     Published Date: Apr 20, 2010
This paper will examine the 5 ways storage waste is persisting and growing in the midst of Green IT initiatives and how to end storage waste.
Tags : 
pillar data systems, storage waste, green it, server virtualization, data center, san, production deployment, storage virtualization, green computing, data center design and management
    
Pillar Data Systems
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -California edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, california edition, email security
    
Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Wisconsin Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, wisconsin edition, email security, internet security
    
Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Wisconsin Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, wisconsin edition, email security, internet security
    
Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Massachusetts Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, massachusetts edition, email security, internet security
    
Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Michigan Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, michigan edition, email security, internet security
    
Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Nevada edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, nevada edition, email security, internet security
    
Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Washington edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, washington edition, email security, internet security
    
Symantec.cloud
By: BlackBerry     Published Date: Apr 13, 2010
In this webcast, Mike Kirkup tells about BlackBerry application platform which simplifies the development, deployment and management of wireless applications. Leverages the core strengths of the BlackBerry solution to mobilize additional business processes and applications.
Tags : 
blackberry, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless messaging, wireless phones, wireless security, wireless service providers
    
BlackBerry
By: BlackBerry     Published Date: Apr 13, 2010
Mobile deployments in business are growing at an accelerating rate, enabled by increasingly capable devices at attractive prices, faster, less costly, and more reliable wireless networks being deployed across wider areas, and an expanding array of mobile applications that empower the mobile workforce with an abundance of business critical functions.
Tags : 
blackberry, iphone, windows, wireless networksmicrosoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless messaging, wireless phones
    
BlackBerry
By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix, linux, mac, nis
    
Centrify Corporation
By: HP Virtualization     Published Date: Mar 22, 2010
This white paper describes how HP LeftHand SANs can help you deploy VMware Infrastructure 3 (VI3) software more effectively through volume snapshots, SmartClone volumes, volume migration, and high-availability features. With HP LeftHand SAN and VI3, organizations can reclaim valuable data center space and reduce their power and cooling requirements.
Tags : 
san, storage area networks, vmware, software, migration, infrastructure, internetworking hardware, power sources & conditioning devices, data center design and management
    
HP Virtualization
By: Jive Software     Published Date: Mar 03, 2010
Learn how an industry-leading provider of storage and data management solutions used Social Business Software to accelerate a global branding initiative and connect with thousands of community members across one hundred countries.
Tags : 
jive, netapp community, social business software, storage, data management, hosting, online community, brand awareness, web experience, deployment
    
Jive Software
By: F5 Networks Inc     Published Date: Feb 25, 2010
Learn how Domain Name System Security Extensions (DNSSEC) can add security to DNS while maintaining the backward compatibility needed to scale with the Internet as a whole.
Tags : 
dnssec, dns cache poisoning, domain name system security extensions, encryption, deployment, cryptographic, internet security, security management
    
F5 Networks Inc
By: F5 Networks Inc     Published Date: Feb 24, 2010
Learn how to make your VDI deployment a success and keep the user experience on par with a local desktop.
Tags : 
vmware view optimization, vdi deployment, desktop, virtualization, virtual desktop infrastructure, virtual platform, application delivery network, storage virtualization, server virtualization, content delivery, desktop management
    
F5 Networks Inc
By: ASG Software Solutions     Published Date: Feb 23, 2010
Virtualization continues to grow at 20 percent or more per year, but it is not expected to overtake existing physical architectures at least through 2010. This white paper examines the unique challenges of virtualization and offers tips for its successful management alongside IT's physical deployments.
Tags : 
asg, cmdb, virtualization, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
By: Lionbridge     Published Date: Jan 20, 2010
User Customization & Configuration in Software-as-a-Service Deployments
Tags : 
lionbridge, saas, configuration, software-as-a-service deployment, software outsourcing, configuration management, service oriented architecture
    
Lionbridge
By: Sun Microsystems     Published Date: Jan 11, 2010
In this free webcast, learn how business intelligence is changing-and how to best keep pace with it. The amount of available data is exploding; yet much of it is kept in separate silos, where it can't be combined to form meaningful insights. This webcast introduces the latest business intelligence technology that can help you discover your insight "needle" in a haystack of data.
Tags : 
sun, webcast, business intelligence, open source, data, data management, sun microsystems, databasing, backup and recovery, storage management, database development, web development, web service management
    
Sun Microsystems
By: NetApp     Published Date: Jan 07, 2010
NetApp best practices cover important new features of Microsoft® HyperV™ as well as lessons learned from numerous deployments. Learn how to configure networks, set appropriate iGroups and LUN types, avoid alignment problems, and configure CSVs.
Tags : 
netapp, microsoft hyper-v virtualization, configure network, deployment, igroups, lun, tech ontap, storage, server 2008 r2, disk allignment, cluster, clustering, ip storage, network attached storage, storage virtualization, best practices, server virtualization
    
NetApp
By: NetApp     Published Date: Jan 01, 2010
This report examines the impact that virtualization has on data protection and disaster recovery and the need for highly virtualized servers and storage within this context.
Tags : 
netapp, data protection, virtualization deployments, disaster recovery, networked storage, backup, network management, backup and recovery, network attached storage, storage virtualization, server virtualization
    
NetApp
By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing, identity management, policy based management, security management, security policies, application integration, configuration management, data protection
    
Ounce Labs, an IBM Company
By: vWire     Published Date: Dec 02, 2009
A commissioned study conducted by Forrester Consulting on behalf of Tripwire. This study included inquiry into the current role of virtualization in the overall environment and barriers to further deployment, as well as how performance is measured for both the environment and those managing virtualized servers.
Tags : 
vwire, tripwire, server virtualization, productivity, roi, consolidate, server management, storage area networks, storage virtualization, return on investment
    
vWire
Start   Previous    50 51 52 53 54 55 56 57 58 59 60 61 62 63 64    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter