Client Server ExamplesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Client Server Examples returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Enterprise Systems Management
 •   WAN/ LAN Solutions
 •   Data Security
 •   Desktop Management
 •   Data Center Management
 •   Application Servers
 •   Statistical Data Analysis
 •   Network Security
 •   Business Process Management (BPM)

Related Searches
 •   Client Layout
 •   Client Server Budgets
 •   Client Server Compliance
 •   Client Server Examples Developments
 •   Client Server Examples Finds
 •   Client Server Examples System Software
 •   Client Server History
 •   Client Server Solution Software
 •   Compare Client Server Examples
 •   Owning Client
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..

Improving End-User Performance by Eliminating HTTP Chattiness by F5 Networks

April 2007 - (Free Research)
Many organizations embark on global multi-million dollar web application deployments only to later discover that their users are unsatisfied with the performance compared to their old client server application. This paper provides alternatives. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Ten Reasons Why Thin Client Projects Fail by Pano Logic, Inc

December 2009 - (Free Research)
This presentation transcript features industry experts, Brian Madden and Gabe Knuth as they discuss the top 10 reasons for thin client project failure. Learn how to avoid common mistakes by choosing the right devices for your environment. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-Book: Network Planning for Cloud Computing by SearchNetworking.com

May 2010 - (Free Research)
Cloud computing comes in different shapes and sizes, and the architecture used will have an impact on the network. Network managers must be involved in on the cloud architecture decision and must understand the impact that private, public, or hybrid clouds will have on the network. Read on to learn more about network planning for cloud computing. 
(EBOOK) READ ABSTRACT |

10 Reasons Your Existing Security Information and Event Management Isn't Good Enough by eIQnetworks

February 2009 - (Free Research)
"Are we secure? Is our data protected?" Enterprises have turned to security information and event management (SIEM) solutions to answer these questions and address forensics or security operations issues. For the most part, SIEMs have failed to do what they promised. Read this paper to see what the problems are, and what solutions are available. 
(WHITE PAPER) READ ABSTRACT |

Solution Brief: Accelerating SSL Applications Across the WAN by BlueCoat

June 2010 - (Free Research)
Secure Sockets Layer (SSL) is the industry-standard protocol for establishing a secure communications link when transmitting information over untrusted networks. However, SSL can create complications when it comes to prioritizing, optimizing, and accelerating network traffic. This paper outlines a solid strategy for optimizing SSL applications. 
(WHITE PAPER) READ ABSTRACT |

Lord Grey School builds a dynamic infrastructure for thin client computing by IBM and Intel

June 2011 - (Free Research)
Lord Grey School wanted to extend its thin client network into more classrooms, but its existing infrastructure lacked the capacity to support this expansion. Read this case study to see how the school solved the problem by deploying 18 new IBM® System x3550 M3 servers and an IBM System Storage® DS3400 disk storage system. 
(CASE STUDY) READ ABSTRACT |

Building the business case for upgrading servers by ComputerWeekly.com

November 2010 - (Free Research)
With every major IT purchase expected to deliver a rapid payback in the current economic climate, it is vital to demonstrate in hard numbers the return on investment for upgrading servers when they are struggling to support the business. This report offers a guide to calculating the ROI for moving to the latest server technology. 
(WHITE PAPER) READ ABSTRACT |

NEC Virtual PC Center (VPCC) Product and Technology Overview by NEC Corporation

August 2009 - (Free Research)
NEC offers a complete virtual desktop solution, including all necessary software and a selection of NEC hardware components, including the virtualization hypervisor, management tools, client broker, thin clients, servers, and storage. 
(WHITE PAPER) READ ABSTRACT |

Reed & Mackay harnesses analytics to save clients’ travel costs by IBM

April 2013 - (Free Research)
View this white paper to learn more about how Reed & Mackay improved the value of their business with analytics. This successful travel company generated detailed reports for each of its clients showing the fares they paid, reductions and others cost to give examples of how the agency can assist the clients. 
(WHITE PAPER) READ ABSTRACT |

SearchExchange.com eGuide: Advice for Virtualizing Exchange 2010 Server Roles by IBM

August 2011 - (Free Research)
When virtualizing Exchange Server 2010, it's important to correctly configure virtual machines (VMs) that will host certain Exchange Server roles – otherwise a few gotchas will surface. This e-guide provides advice for correctly configuring VMs for optimal performance. 
(EGUIDE) READ ABSTRACT |

IPV6 Transition – Why the rush ? by ComputerWeekly.com

December 2011 - (Free Research)
This report from Ovum warns that enterprises need to recognise that they will need to move to IPv6, even if they have IPv4 addresses available. They should treat IPv6 like any other disaster recovery plan. 
(ANALYST BRIEF) READ ABSTRACT |

Hands-on Oracle Application Express security by ComputerWeekly.com

November 2013 - (Free Research)
This book extract demonstrates how Oracle Application Express (APEX) can be vulnerable to SQL injection, using sample code. 
(BOOK) READ ABSTRACT |

Mobility - Aironet 1100 Series by Cisco Systems

The Cisco Aironet® 1100 Series delivers an affordable and upgradable 802.11b wireless LAN (WLAN) solution, setting the enterprise standard for high performance, secure, manageable, and reliable WLANs. 
(HARDWARE PRODUCT)

Best Practices: Backing Up VMware with Veritas NetBackup by Symantec Corporation

January 2009 - (Free Research)
As there are many ways of using VMware technology, there are just as many methods available for protecting this innovative technology. System administrators and IT technologists can use this paper to determine one of three recommended solutions for protecting VMs. Each of these technologies has relative advantages and disadvantages. 
(WHITE PAPER) READ ABSTRACT |

Weathering a Global Fiscal Crisis: Doing More for Less with SAP by SAP America, Inc.

April 2010 - (Free Research)
This paper provides concrete guidance and a detailed example of how clients can gain measurable business benefit through iterative business process improvement enabled by an SAP applications platform. 
(WHITE PAPER) READ ABSTRACT |

Tip Guide-- DCM and analytics: Better together- and better for customers, too by IBM

November 2011 - (Free Research)
Companies in a variety of industries increasingly use dynamic case management (DCM) to streamline workflow, enable collaboration and, ultimately, serve their customers and clients better and faster than ever before. This Tip Guide introduces the trend, and provides examples of how analytics can be used to enhance DCM. 
(EGUIDE) READ ABSTRACT |

IBM Perspective on Cloud Computing by IBM

January 2011 - (Free Research)
Cloud computing has created a lot of buzz in the marketplace, as well as confusion about its benefits. This free white paper is geared for both IT and business leaders. Read an overview of what cloud computing is, the types of "clouds" and examples of how clients are using cloud computing to reduce costs and increase efficiencies 
(WHITE PAPER) READ ABSTRACT |

Unraveling Web Malware by FireEye

September 2008 - (Free Research)
There's no denying the rapid rise in the use of Web-based blended threats to compromise client browsers and operating systems. Increasing use of Web 2.0 technologies, syndicated, iframes, third-party widgets - all of these proliferate malicious software. 
(WHITE PAPER) READ ABSTRACT |

Business Ready Solutions for Virtual Infrastructure Availability Using Dell™ PowerEdge™ Servers, Dell Powervault™ Storage, and VMware vSphere™ by Dell, Inc. and Intel®

July 2009 - (Free Research)
This white paper presents an example configuration and best practices for deploying and configuring a highly available architecture using an example solution configuration and then discussing how the configuration helps in maximizing uptime. 
(WHITE PAPER) READ ABSTRACT |

The Impact of AJAX on the Network by F5 Networks

March 2007 - (Free Research)
Though AJAX has a unique impact on the client, server, and the network, these challenges are addressed by existing, proven application delivery methods that address similar challenges arising from other technologies. 
(WHITE PAPER) READ ABSTRACT |

SSL VPN for Secure Wireless LAN Access by F5 Networks

October 2007 - (Free Research)
For most deployment scenarios, an SSL VPN appliance can provide many of the features and benefits of a special purpose WLAN controller for wireless access, but at a much lower cost and with greater flexibility. This paper describes the key sell... 
(WHITE PAPER) READ ABSTRACT |

Debunking the Myth of the Single-Vendor Network by Juniper Networks, Inc.

December 2010 - (Free Research)
Read this analyst report to see why most organizations should consider a dual-vendor or multivendor solution as a viable approach to building their network.  Not only are significant cost savings achievable with no increase in network complexity, but there is also an improvement in focus on meeting business requirements. 
(ANALYST REPORT) READ ABSTRACT |

Analytics: A powerful new force in dynamic case management by IBM

November 2011 - (Free Research)
A growing number of companies are revving up their dynamic case management (DCM) efforts with analytics technology, which helps users detect patterns, spot trends and gain other insights from their case information. This e-guide introduces the trend, and offers seven expert tips for combining the two technologies for maximum success. 
(EGUIDE) READ ABSTRACT |

Tips on Implementing Database Auditing to Address Security & Compliance Requirements  by IBM

December 2010 - (Free Research)
Implementing Database Security and Auditing (Elsevier Digital Press) is the definitive guide for information security professionals, DBAs and auditors. You can now download Chapter 12, “Auditing Categories”.  In this chapter, you’ll learn which audit logging trails you need to address key security and compliance requirements. 
(BOOK) READ ABSTRACT |

Accenture Technology Vision 2013 by ComputerWeekly.com

February 2013 - (Free Research)
Accenture's technology vision assesses the impact of digital technology on the enterprise in 2013 and offers action points for CIOs and business leaders. 
(IT BRIEFING) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts