Configurations BasedWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Configurations Based returned the following results.
RSS What is RSS?
Related Categories

 •   Change and Configuration Management
 •   Virtualization
 •   Storage Management
 •   Networks
 •   Data Center Management
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Enterprise Systems Management
 •   Software Configuration Management (SCM)
 •   Network Security
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)

Related Searches
 •   Budget Configurations Based
 •   Configurations Based Alabama
 •   Configurations Based Distributions
 •   Configurations Computers
 •   Configurations Devices
 •   Corporation Configurations
 •   Displays Configurations Based
 •   Timeline Configurations
 •   Web Cast Configurations Based
Advertisement

ALL RESULTS
1 - 25 of 480 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Motorola's Wireless Broadband Indoor/Outdoor Solution by Motorola, Inc.

April 02, 2009 - (Free Research)
With a Wi-Fi network, businesses can increase the efficiency of their mobile employees resulting in increased ROI and greater profitability. This document highlights two specific indoor/outdoor Wi-Fi network configurations based on Motorola's MOTOMESH Duo product solution. 
(WHITE PAPER) READ ABSTRACT |

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 28, 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

Dell DX Object Storage Platform - Advanced Storage Node Configuration by Dell, Inc.

April 27, 2011 - (Free Research)
The Dell DX Object Storage Platform provides configuration of cluster-wide parameters through the web-based management console on the DX Cluster Services Node (CSN). This white paper provides instructions on configuring advanced configurations through the node configuration files. 
(WHITE PAPER) READ ABSTRACT |

Strategies for Cisco VPN Client Large-Scale Deployments by Global Knowledge Network, Inc.

March 2006 - (Free Research)
This paper explores the tools Cisco provides to simplify mass deployments of the VPN Client. The two methods are discussed: the creation of an installation CD-ROM and network-based installations. I will explain how to reduce calls to the Help Desk by locking users out of advanced configuration functions in the user interface. 
(WHITE PAPER) READ ABSTRACT |

ExtraView Enterprise by Extraview Corporation

ExtraView Enterprise enables organizations to quickly and cost-effectively, create user specific web-based solutions that conform to a corporation's unique business processes and workflow requirements. 
(ASP & SOFTWARE PRODUCT)

Cisco Catalyst 2950 Series Switches with Enhanced Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

Orion Network Configuration Manager (NCM) by SolarWinds, Inc.

July 2009 - (Free Research)
Check out this download to see how the Orion Network Configuration Manager aids in managing network configuration files in multi-vendor network environments, monitoring changes to device configurations and ensuring compliance with federal and corporate policies. 
(TRIAL SOFTWARE) READ ABSTRACT |

Solutions Guide: Business Ready Configurations for Data Center Virtualization by Dell and VMware

July 2009 - (Free Research)
Business Ready Configurations for Virtualization are pre-configured, easy to order, bundled solutions that include Dell PowerEdge™ blade servers, Dell EqualLogic™ SAN, and VMware vSphere™. This white paper provides a detailed reference architecture for the Business Ready Configurations. 
(WHITE PAPER) READ ABSTRACT |

Windows Server® 2008 Hyper-V Technology Introduction by Dell and Microsoft

October 2009 - (Free Research)
Dell's Hyper-V Technology Introduction for Windows Server® 2008 is a rapid approach to the deployment and configuration of a Hyper-V and SystemCenter Virtual Machine Manager 2008 (SCVMM) based Proof of Concept (POC) into your pre-production test lab. 
(DATA SHEET) READ ABSTRACT |

Liebert Monitoring by Liebert Corporation

The Albér Cellcorder CRT-300 cell resistance tester displays and records cell float voltage, internal cell resistance and intercell connection resistance. The portable unit includes a memory card, backlit graphical reflective LCD.... 
(HARDWARE PRODUCT)

Configuration Assessment: Choosing the Right Solution by Tripwire, Inc.

July 2008 - (Free Research)
Check out this white paper to discover how automated configuration assessment solutions like Tripwire Enterprise help ease the burden on IT of achieving and maintaining compliance, securing the IT infrastructure, and generating evidence for mandatory audits. 
(WHITE PAPER) READ ABSTRACT |

Cisco 870 Series Integrated Services Routers for Small Offices by Cisco Systems, Inc.

Cisco 870 Series of integrated services routers are fixed-configuration routers that support multiple types of DSL technologies, broadband cable, and Metro Ethernet connections in small offices. 
(HARDWARE PRODUCT)

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Epicor's IT Service Management - Expert IT Help Desk Software by Epicor Software Corporation

 
(SOFTWARE PRODUCT)

Discovering Novell ZENworks 11 by Novell, Inc.

November 2010 - (Free Research)
Novell is taking its family of systems-management products to the next level with ZENworks 11—by integrating them all into a single policy-based platform; providing unified management for a wider range of Windows and Linux devices; and making it easy to extend automated device management across physical, virtual and cloud environ­ments. 
(WHITE PAPER) READ ABSTRACT |

Dell DX Object Storage Platform-Remote Replication Configuration by Dell, Inc.

April 2011 - (Free Research)
The target audience for this white paper is advanced DX Storage administrators and support teams. It is meant to provide instructions on advanced configuration of asynchronous remote replication through these configuration files. 
(WHITE PAPER) READ ABSTRACT |

Cisco Catalyst 3560 Series Switches by Cisco Systems, Inc.

The Cisco® Catalyst® 3560 Series is a line of fixed-configuration, enterprise-class switches that include IEEE 802.3af and Cisco prestandard Power over Ethernet (PoE) functionality in Fast Ethernet and Gigabit Ethernet configuration. 
(HARDWARE PRODUCT)

NetBackup 6.5: Enabling Next-Generation Disk-Based Data Protection by Symantec Corporation

February 2008 - (Free Research)
Symantec's Veritas NetBackup 6.5, the latest release of the company's established market-leading enterprise backup and recovery solution, provides disk-based data protection for remote office and enterprise datacenter environments. 
(WHITE PAPER) READ ABSTRACT |

Lumension Vulnerability Scanner Offer by Lumension

March 2009 - (Free Research)
This network-based scanning utility provides comprehensive visibility into the IT environment through in-depth scans and the automated discovery of all assets, both managed and unmanaged. Scan up to 25 nodes. 
(ASSESSMENT TOOL) READ ABSTRACT |

Cloud Based Application Architecture Using Smart Computing by Joyent

September 2010 - (Free Research)
Joyent’s Smart Computing architecture is a comprehensive and integrated system that spans from dynamic CPU and memory usage through complete data center management and resource allocation. This paper provides a broad framework for companies to examine typical Joyent cloud computing application architectures. 
(WHITE PAPER) READ ABSTRACT |

Virtualizing Microsoft® Exchange Server 2007 on Dell™ Systems Running Microsoft Windows Server® 2008 Hyper-V™ by Dell and Microsoft

April 2009 - (Free Research)
In this paper, various configurations of Exchange Server 2007 are tested in physical and virtual environments to evaluate the performance scalability and to understand the sizing requirements for Exchange Server 2007 in a virtualized environment. 
(WHITE PAPER) READ ABSTRACT |

Network Barometer Report 2011 by Dimension Data

June 2011 - (Free Research)
This report reviews the networks’ readiness to support business by evaluating the configuration variance from best practices, potential security vulnerabilities and end-of-life status of the included network devices. 
(ANALYST REPORT) READ ABSTRACT |

DELL DX Object Storage Platform – Remote Synchronous Replication Configuration by Dell, Inc.

April 2011 - (Free Research)
The purpose of this document is to provide DX Storage administrators, application developers, and support teams instructions on the DX platform configuration required when applications are utilizing the remote synchronous write feature to enable synchronous writes to a local and remote DX Clusters. 
(WHITE PAPER) READ ABSTRACT |

z Cisco Catalyst 2950 Series Switches with Standard Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

Protect, Detect, and Correct: What's New in Tripwire Enterprise 8 by Tripwire, Inc.

February 2011 - (Free Research)
Configurations that "drift" from compliance, by the accrual of gradual, sometimes minute changes often lead to exploits, audit failures, and unplanned repair time. Worse still, it takes even more time to bring new, fresh, out-of-the-box servers up to a compliant, audit-passing state—sometimes a half a day or more per machine. 
(DATA SHEET) READ ABSTRACT |

1 - 25 of 480 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts