Pointers White Papers

(View All Report Types)
A New Dimension in IT Infrastructure Management
sponsored by Raritan Inc.
WHITE PAPER: This white paper describes how KVM technology can improve system reliability, manageability, and security, resulting in lower TCO and less downtime.
Posted: 18 Jan 2008 | Published: 01 Sep 2004

Raritan Inc.

The Power of Mobile Peripherals
sponsored by BlackBerry
WHITE PAPER: This white paper discusses how mobile peripherals help extend the value of BlackBerry solutions such as automate data collection, improve accuracy, and lower costs, among other benefits.
Posted: 18 Feb 2010 | Published: 18 Feb 2010

BlackBerry

Advanced RFID Measurements: Basic Theory to Protocol Conformance Test
sponsored by National Instruments
WHITE PAPER: As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
Posted: 21 Jul 2008 | Published: 01 Jan 2006

National Instruments

Dell PowerEdge C8000 Series: Flexible, Powerful, and Efficient
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Check out this brief resource to learn about the Dell PowerEdge C8000 – the only shared infrastructure which enables organizations to easily reconfigure, refresh and scale out as needed.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Dell, Inc. and Intel®

How to Adapt to the Dynamics of the Virtual Workforce
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This exclusive paper takes an in-depth look at an integrated solution stack from Dell that enables desktop virtualization, from pilots to full scale deployments, as a complete data center solution.
Posted: 12 Jun 2013 | Published: 12 Jun 2013

Dell, Inc. and Intel®

Enterprise Solution Design for SAP HANA
sponsored by HP & Intel®
WHITE PAPER: In this resource, explore the three principles of great enterprise design—stability, scalability, and agility—and learn how to apply them to your SAP landscape with a focus on SAP HANA. Read on for best practices and key design considerations for implementing your SAP HANA enterprise-level solution.
Posted: 25 Sep 2013 | Published: 28 Feb 2013

HP & Intel®

Performance, Reliability and Flexibility of Windows 7 in a Thin Client
sponsored by Dell
WHITE PAPER: Take a look at desktop virtualization hardware solutions with dual- and quad-core options to suit your unique needs.
Posted: 14 Nov 2014 | Published: 11 Nov 2014

Dell

Dell: Expanding Its Position as an HPC Market Leader
sponsored by Dell, Inc. and Intel®
WHITE PAPER: With several offerings available, choosing the ideal high performance computing (HPC) offering for your business can be a daunting task. This resource examines one well-reputed HPC vendor and explains how it differentiates itself in the competitive marketplace.
Posted: 02 Apr 2012 | Published: 01 Apr 2011

Dell, Inc. and Intel®

The Corporate PC Refresh Project
sponsored by Cibecs
WHITE PAPER: This comprehensive white paper explores the many challenges organizations need to address in order to ensure smooth implementation, coordination and management of their PC refresh initiatives.
Posted: 06 Jul 2011 | Published: 06 Jul 2011

Cibecs

Cloud Disaster Recovery: Practical Applications and Pointers for the SMB
sponsored by Symantec Corporation
EGUIDE: This expert guide from SearchStorage.com discusses how cloud-based services can simplify and streamline your disaster recovery and outlines key phases of the DR planning process.
Posted: 24 May 2013 | Published: 24 May 2013

Symantec Corporation

Identifying the Hidden Risk of Data De-duplication: How the HYDRAstor Solution Proactively Solves the Problem
sponsored by NEC Corporation of America
WHITE PAPER: Data de-duplication has recently gained significant industry attention, especially for disk-based backup products.
Posted: 07 Jan 2008 | Published: 01 Jan 2007

NEC Corporation of America

SharePoint E-Zine Volume 15: Top Five SharePoint Challenges and Solutions
sponsored by TechTarget Search Windows Server
EZINE: Having some issues with SharePoint? It happens. This issue describes some of SharePoint's most common problems and provides the fixes to solve them. Also in this issue, get some pointers on how to manage external data access as part of your governance plan, and weigh the pros and cons of SharePoint social computing.
Posted: 20 Oct 2009 | Published: 20 Oct 2009

TechTarget Search Windows Server

Managing SharePoint in an Enterprise Environment
sponsored by Global Knowledge
WHITE PAPER: Microsoft Office SharePoint Server 2007 and other SharePoint technologies are excellent tools for a modern, web-based office environment. This white paper gives pointers on managing them.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Healthcare Ransomware Attack: Prevention and Backups Are Critical
sponsored by Cisco Umbrella
EGUIDE: In this e-guide, explore 6 pointers for preventing ransomware attacks according to Harun Rashid, VP of Global Health Services and CIO of Children's Hospital of Pittsburgh of UPMC.
Posted: 24 May 2017 | Published: 24 May 2017

Cisco Umbrella

Master Guide – Migrating SQL Server 2000 to SQL Server 2008
sponsored by DellEMC and Intel®
WHITE PAPER: This Deployment Guide reviews the approach that Principled Technologies and Dell recommend for migrating databases from SQL Server 2000 to SQL Server 2008.
Posted: 10 Sep 2009 | Published: 23 Apr 2008

DellEMC and Intel®

Healthcare CIOs Address Cybersecurity Vulnerabilities
sponsored by Optum
EGUIDE: As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum

Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response
sponsored by Xerox
EGUIDE: In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.
Posted: 20 Oct 2016 | Published: 19 Oct 2016

Xerox

Sharepoint E-zine Vol.3: Using SharePoint's InfoPath feature to generate forms
sponsored by TechTarget Search Windows Server
EZINE: This guide explains planning global enterprise SharePoint deployments, creating custom global search scopes in SharePoint and top tips for harnessing Microsoft SharePoint governance.
Posted: 24 Oct 2008 | Published: 23 Oct 2008

TechTarget Search Windows Server

Pulse E-zine: Vol. 2, No. 2
sponsored by TechTarget Health IT
EZINE: Access this edition of Pulse e-zine to explore the evolving mobile healthcare trend, and learn how to stay compliant for the dreaded unannounced HIPAA audits.
Posted: 07 May 2014 | Published: 07 May 2014

TechTarget Health IT

Microsoft's Suite Office: 365 Migration
sponsored by TechTarget Search Windows Server
EBOOK: This three-part guide explains how to pull off a move to Office 365 with as little difficulty as possible. Read on to learn about the potential complications and figure out the best ways to avoid downtime. Whether it is the 365 MFA function, access to cloud-hosted services, or updated office applications, this guide has you covered.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

TechTarget Search Windows Server

Journey towards Zero Defects: Challenges, Best Practices and Testing Models
sponsored by Wipro
WHITE PAPER: Organizations face different challenges at different levels of testing maturity. Testing Maturity Model (TMM) and Test Process Improvement (TPI) are two of the contemporary testing maturity models discussed in this paper.
Posted: 10 Nov 2005 | Published: 01 Nov 2005

Wipro

Balancing User Experience and Data Risks
sponsored by TechTarget CIO
EBOOK: A great user experience is the holy grail of mobile app development, but it doesn't have to be unattainable. Get tips on how to balance UX with mobile data security.
Posted: 11 Nov 2015 | Published: 11 Nov 2015

TechTarget CIO

SUN SYSTEMS FOR ORACLE COHERENCE: An optimal in-memory data grid architecture
sponsored by Sun Microsystems, Inc.
WHITE PAPER: Optimizing the benefits of a data grid built with Oracle Coherence relies upon creating a modular, balanced architecture. Matching the number of application servers, memory capacity, and quantity of processing nodes to the target workload characteristics is important to achieving the best performance.
Posted: 11 Nov 2009 | Published: 11 Nov 2009

Sun Microsystems, Inc.

Healthcare Cybersecurity Best Practices
sponsored by ServiceNow
EGUIDE: In this expert e-guide, find out what CIOs attending HIMSS 2016 had to say on how to best identify and protect against healthcare cybersecurity vulnerabilities. Plus, learn why one CIO believes network monitoring is the key to cybersecurity in healthcare.
Posted: 13 Jun 2016 | Published: 07 Jun 2016

ServiceNow

ERP Curveballs: Cost, Customization, Cloud
sponsored by TechTarget Data Management
EBOOK: To have the fastest, agile, most profitable business, companies are going to have to keep up. And Cloud ERP is just one shift to understand -- now, not tomorrow. Learn what trends to manage against and what hassles to avoid.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

TechTarget Data Management

Panzura Data Services Search, View, Manage And Audit Cloudfs Files
sponsored by Panzura
PRODUCT OVERVIEW: According to a recent study, U.S. workers lose nearly 3 hours of productivity per week due to duplicated work, including recreating files that cannot be easily found. Download this product overview to learn about how Panzura Data Services can provide a centralized all-in-one viewpoint of your cloud data.
Posted: 02 Jan 2024 | Published: 03 Jan 2024

TOPICS:  .NET
Panzura

Dedupe for Virtual Setups
sponsored by DellEMC and Intel®
PRESENTATION TRANSCRIPT: This one-page transcript of a presentation by deduplication expert Howard Marks gives an overview of the pros and cons of different dedupe processes, and delves into the type that Microsoft's Hyper-V 3.0 employs and why.
Posted: 20 Mar 2013 | Published: 20 Mar 2013

DellEMC and Intel®

What to look for in next-gen data snapshot techs
sponsored by DellEMC and Intel®
PRESENTATION TRANSCRIPT: This presentation transcript, featuring backup expert Brien Posey, takes a look at the defining characteristics of a next-generation data snapshot and how this technology fits into traditional data protection programs.
Posted: 20 Mar 2013 | Published: 20 Mar 2013

DellEMC and Intel®

Using Cyclomatic Path Analysis to Detect Security Vulnerabilities
sponsored by McCabe Software, Inc.
WHITE PAPER: The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.
Posted: 10 Nov 2010 | Published: 10 Nov 2010

McCabe Software, Inc.

Virtual currencies and their potential role in cyber crime
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.
Posted: 08 Feb 2021 | Published: 04 Aug 2016

TechTarget ComputerWeekly.com

E-Guide: Evaluating Deduplication Systems: The key considerations you don’t know about
sponsored by HP Inc
EGUIDE: In this SearchDataBackup.com E-Guide, storage expert W. Curtis Preston discusses deduplication systems, and the steps you need to take to make sure your dedupe solution is on the right side of those two extremes, while ESG Senior Analyst Lauren Whitehouse offers insight into taking a software or hardware approach to deduplication.
Posted: 10 Aug 2011 | Published: 10 Aug 2011

HP Inc

Get the Coverity Scan 2010 Open Source Integrity Report featuring the Android Integrity Report
sponsored by Coverity by Synopsys
WHITE PAPER: The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others. Read on to learn more about these results.
Posted: 27 Jan 2011 | Published: 27 Jan 2011

Coverity by Synopsys

E-Guide: Using Dedupe for Disk & Restoring Deduped Data
sponsored by ExaGrid Systems, Inc.
EGUIDE: Some storage managers are still unsure as to where and how they should be using their dedupe technology in disk backup or how to restore deduped data. This SearchDataBackup.com E-Guide can help by outlining top tips on how to use dedupe in disk-based backup and how dedupe affects the recovery process.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

ExaGrid Systems, Inc.

Violin Solution Brief Data Reduction
sponsored by Violin Memory
WHITE PAPER: This white paper explains why granular control is the best way to utilize data reduction tools deduplication and compression. Find out exactly what granular control is and how a leading product can help with data reduction.
Posted: 21 Oct 2014 | Published: 29 Aug 2014

Violin Memory