• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

deployment

Results 1426 - 1450 of 1571Sort Results By: Published Date | Title | Company Name
By: SafeNet     Published Date: Jul 20, 2010
This paper compares the strengths and weaknesses of hardware- and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.
Tags : 
safenet mobile, hardware and software authentication, teleworker, smart phone, remote access, deployment, tco, security
    
SafeNet
By: Red Hat     Published Date: Jul 16, 2010
This paper tells managers evaluating middleware how it's done and why JBoss Enterprise Middleware products are an ideal platform for deploying mission-critical applications.
Tags : 
red hat, open source, jboss enterprise middleware, deployment platform, software localization, soa, application integration, enterprise software
    
Red Hat
By: Red Hat     Published Date: Jul 14, 2010
This paper demonstrates the steps to deploy and configure a LAMP infrastructure and application with Red Hat Enterprise Linux.
Tags : 
red hat, enterprise linux, lamp, deployment, configuration, application integration, apache, mysql
    
Red Hat
By: Red Hat     Published Date: Jul 14, 2010
Real uses prove that Red Hat Enterprise Linux has lower costs than Microsoft Windows Server 2008, improving as you scale up. It offers more efficient management costs and better flexibility and is the most tested, secure OS backed by global support.
Tags : 
red hat, enterprise linux, microsoft windows server 2008, roi, deployment, building computing, lifecycle, tco
    
Red Hat
By: Appian     Published Date: Jun 28, 2010
Leveraging Rapid Process Application Development, Deployment, Adoption and Use for Business Value.
Tags : 
appian, bpm, business process management, process application development, application performance management, business management
    
Appian
By: HP     Published Date: Jun 25, 2010
Network teams are faced with a race to build out data center network capacity and to effectively provision connectivity at an increasing speed.
Tags : 
networking dynamics, intelligent server access, matrix operating environment, investment protection, predictable performance, 3com, pragmatic deployment, flexfabric evolution path
    
HP
By: Raritan Inc.     Published Date: Jun 23, 2010
Virtualization presents a tremendous opportunity for IT organizations. Yet deployment involves major process and management complexities. This white paper outlines best-practice methodologies that help you tackle challenges brought on by virtualization. We also suggest key questions to ask when evaluating a consolidated management solution.
Tags : 
power distribution unit, raritan, pdu, power monitoring, environmental monitoring, data center power, data center monitoring, monitor power
    
Raritan Inc.
By: LANDesk     Published Date: Jun 07, 2010
Windows 7 adoption is one of IT's top priorities for 2010. A solid adoption strategy requires 12 to 18 months for thorough planning and testing before actual Windows 7 deployment can begin. But nearly two-thirds of companies don't yet have a Windows 7 adoption plan in place. In this White Paper LANDesk have identified seven pitfalls that IT organizations must avoid as they embark on Windows 7 adoption.
Tags : 
avocent, landesk, windows 7, microsoft, windows, vista, support, sp2
    
LANDesk
By: Pillar Data Systems     Published Date: Apr 20, 2010
The most critical component of an Exchange deployment is the storage subsystem where the data is held. Download this white paper to learn best practices in storage sizing and deployment.
Tags : 
pillar data systems, microsoft exchange best practices, storage size, exchange deployment, virtualization, storage configuration, data priority, storage virtualization
    
Pillar Data Systems
By: Pillar Data Systems     Published Date: Apr 20, 2010
This paper will examine the 5 ways storage waste is persisting and growing in the midst of Green IT initiatives and how to end storage waste.
Tags : 
pillar data systems, storage waste, green it, server virtualization, data center, san, production deployment, storage virtualization
    
Pillar Data Systems
By: Pillar Data Systems     Published Date: Apr 20, 2010
Download this white paper to learn the key benefits of VTL.
Tags : 
pillar data systems, vtl deployment, disk-based backup, virtual tape libraries, data storage, fibre channel, san, restore
    
Pillar Data Systems
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -California edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, california edition, email security
    
Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Wisconsin Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, wisconsin edition, email security
    
Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Wisconsin Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, wisconsin edition, email security
    
Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Massachusetts Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, massachusetts edition, email security
    
Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Michigan Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, michigan edition, email security
    
Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Nevada edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, nevada edition, email security
    
Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Washington edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, washington edition, email security
    
Symantec.cloud
By: BlackBerry     Published Date: Apr 13, 2010
In this webcast, Mike Kirkup tells about BlackBerry application platform which simplifies the development, deployment and management of wireless applications. Leverages the core strengths of the BlackBerry solution to mobilize additional business processes and applications.
Tags : 
blackberry, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
By: BlackBerry     Published Date: Apr 13, 2010
Mobile deployments in business are growing at an accelerating rate, enabled by increasingly capable devices at attractive prices, faster, less costly, and more reliable wireless networks being deployed across wider areas, and an expanding array of mobile applications that empower the mobile workforce with an abundance of business critical functions.
Tags : 
blackberry, iphone, windows, wireless networksmicrosoft exchange, mobile device management, mobile device management software, mobile workers, remote computing
    
BlackBerry
By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
    
Centrify Corporation
By: HP Virtualization     Published Date: Mar 22, 2010
This white paper describes how HP LeftHand SANs can help you deploy VMware Infrastructure 3 (VI3) software more effectively through volume snapshots, SmartClone volumes, volume migration, and high-availability features. With HP LeftHand SAN and VI3, organizations can reclaim valuable data center space and reduce their power and cooling requirements.
Tags : 
san, storage area networks, vmware, software, migration, infrastructure, internetworking hardware, power sources & conditioning devices
    
HP Virtualization
By: Jive Software     Published Date: Mar 03, 2010
Learn how an industry-leading provider of storage and data management solutions used Social Business Software to accelerate a global branding initiative and connect with thousands of community members across one hundred countries.
Tags : 
jive, netapp community, social business software, storage, data management, hosting, online community, brand awareness
    
Jive Software
By: F5 Networks Inc     Published Date: Feb 25, 2010
Learn how Domain Name System Security Extensions (DNSSEC) can add security to DNS while maintaining the backward compatibility needed to scale with the Internet as a whole.
Tags : 
dnssec, dns cache poisoning, domain name system security extensions, encryption, deployment, cryptographic, internet security, security management
    
F5 Networks Inc
By: F5 Networks Inc     Published Date: Feb 24, 2010
Learn how to make your VDI deployment a success and keep the user experience on par with a local desktop.
Tags : 
vmware view optimization, vdi deployment, desktop, virtualization, virtual desktop infrastructure, virtual platform, application delivery network, storage virtualization
    
F5 Networks Inc
Start   Previous    49 50 51 52 53 54 55 56 57 58 59 60 61 62 63    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter