Filing What StandardsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Filing What Standards returned the following results.
RSS What is RSS?
Related Categories

 •   Storage Management
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Disk-based Backup & Storage/ RAID
 •   Data Security
 •   Backup Systems and Services
 •   Data Center Management
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Replication and Mirroring

Related Searches
 •   Filing Documentation
 •   Filing Reporting
 •   Filing What Architecture
 •   Filing What Guide
 •   Filing What Standards Chart
 •   Filing What Standards License
 •   Filing What Value
 •   Method Filing What Standards
 •   Regional Filing What
 •   Researching Filing
Advertisement

ALL RESULTS
1 - 25 of 445 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Moving to BI Publisher - Now What? Best Practices in Document Delivery Webcast by STR Software

October 29, 2010 - (Free Research)
Learn about native Oracle E-Business Suite BI Publisher document delivery functionality including an overview of bursting control files, what an example looks like and how you upload a bursting control file into Oracle EBS.  In addition, you will learn about advanced fax and email technology available to Oracle E-Business Suite users. 
(WEBCAST) READ ABSTRACT |

NFS Evolution Changes the Landscape of HPC Data Management by BlueArc Corp.

July 02, 2009 - (Free Research)
In HPC data management, traditional standards-based solutions have been limited in performance and scalability, but proprietary, high-performance solutions have required specific expertise to set up, manage, or scale. Read this Tabor Research White Paper to learn about file systems used in HPC environments as well as BlueArc storage solutions. 
(WHITE PAPER) READ ABSTRACT |

Meeting the True Intent of File Integrity Monitoring by Tripwire, Inc.

October 28, 2010 - (Free Research)
In this paper, we give an overview of FIM, an explanation of how FIM provides data protection and improves security, and what capabilities FIM must offer to effectively provide that data protection and security. 
(WHITE PAPER) READ ABSTRACT |

Secure, Reliable, Any-Size File Transfer with FileXpress by Attachmate Corporation

February 20, 2013 - (Free Research)
This brief video introduces a secure, reliable, and collaboration-friendly file transfer strategy capable of accommodating multiple platforms, protocols, and standards – keeping costs down and ensuring the safety of your sensitive information all while allowing you to keep up with the pace of business. 
(WEBCAST) READ ABSTRACT |

Beyond FTP: Securing and Managing File Transfers by Linoma Software

March 15, 2010 - (Free Research)
Every day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol. 
(WHITE PAPER) READ ABSTRACT |

SecurStor 12000/16000 RAID by Excel Meridian Data, Inc.

SecurStor 12000/16000 RAID series are high performance cost effective IDE-to- Ultra160 SCSI or 2 Gb Fibre RAID solutions for workgroups, departmental or LAN storage needs. Scalable from 80 GB to 4TB with up-to (16) IDE hard disk drives. 
(HARDWARE PRODUCT)

Data Deduplication and Compression on Primary Storage Can Reduce Data Footprint by IBM

December 13, 2011 - (Free Research)
What are the most common approaches for deduplication and compression on primary storage? Learn the answer to this and more by checking out this FAQ guide featuring insight from Dave Russell, research VP at Gartner Research. 
(EGUIDE) READ ABSTRACT |

Agentless Architecture: Agentless Backup is Not a Myth by Asigra

April 20, 2009 - (Free Research)
Agentless backup is NOT a myth. The Asigra solution is proof because it requires no agents, which inherently makes it easier to install and support than legacy backup and recovery solutions. This paper serves as an introduction to Asigra's Hybrid Cloud Backup and Recovery Software. 
(WHITE PAPER) READ ABSTRACT |

Enabling Compliance with the PCI Data Security Standards by Vormetric

January 2007 - (Free Research)
Data Encryption Expert fills the gaps in your data protection efforts as an affordable and easy to implement solution to difficult compliance requirements like encryption, access control, host protection and auditing. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Architecting a Lustre-Based Storage Environment by DataDirect Networks

June 2008 - (Free Research)
This document details a number of design implications and provides the reader with information to make informed decisions to scale a high-performance cluster file I/O. 
(WHITE PAPER) READ ABSTRACT |

IBM Linear Tape File System by IBM

May 2011 - (Free Research)
Built on the Linear Tape-Open (LTO) Ultrium 5 format standard, IBM Linear Tape File System provides a direct, intuitive, graphical access to data stored in IBM tape drives and libraries using LTO generation 5 tape cartridges. This eliminates the need for additional tape management software to access data. 
(MICROSITE) READ ABSTRACT |

A Closer Look at Windows Vista by National Instruments

February 2008 - (Free Research)
One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative... 
(WHITE PAPER) READ ABSTRACT |

NetStor MVD NAS by Excel Meridian Data, Inc.

NetStor MVD NAS is extremely versatile and scalable solution. Up-to (6) Gigabit NIC's per system, up-to (15) separate hardware driven RAID's, Snapshot file system for instant file restoration, local or remote tape backup options. Web based administration interface, native Windows file security. 
(HARDWARE PRODUCT)

Infrastructure, Interrupted: Apple in the Enterprise Redefined by Acronis

October 2012 - (Free Research)
Learn more about the evolution of Apple in the enterprise and how you can make shifting standards and multiple platforms work together to benefit your organization. 
(WHITE PAPER) READ ABSTRACT |

CyberFusion Integration Suite (CFI) by Proginet Corporation

CyberFusion Integration Suite (CFI), from Proginet, is the world's most advanced managed file transfer solution. CFI helps organizations overcome the fundamental challenges they face every day as they strive to secure, control, and integrate the data that drives their business. 
(SOFTWARE PRODUCT)

Integrating Information Labeling and Microsoft Active Directory Rights Management Services (AD RMS) by TITUS

November 2010 - (Free Research)
This white paper examines the challenges of content protection and user acceptance of content protection technology. It provides an overview of Microsoft's Active Directory Rights Management Services (AD RMS) and its integration with Titus' Document Classification and Message Classification product suites. 
(WHITE PAPER) READ ABSTRACT |

FAQ Guide: Data Deduplication and Compression on Primary Storage Can Reduce Data Footprint by CommVault Systems, Inc.

August 2011 - (Free Research)
Dave Russell, a research vice president at Gartner, discusses the current techniques for data reduction on primary storage, from standard compression to file- and sub-file deduplication, to a combination of deduplication and compression. He also outlines the emerging approaches that users may find more prevalent in the future. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Data Protection Methods for Object Stores by Quantum Corporation

November 2012 - (Free Research)
If you have billions and billions of files and you want to use a storage system that doesn't have the restrictions of a standard file system, you can use an object store. Check out this expert transcript to learn more about object store and four different data protection methods used for this type of storage. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Lustre Leadership: Cray's Story by Cray

April 2013 - (Free Research)
In this white paper, discover a parallel file system that is being implemented across the high performance computing (HPC) industry – enhancing new applications and providing high levels of scalability to meet a wide range of workloads in standard IT environments. 
(WHITE PAPER) READ ABSTRACT |

LimelightDELIVER: Fast, Reliable, and Scalable Delivery of Video, Music, Games, Social Media, and Software by Limelight Networks, Inc.

March 2009 - (Free Research)
Read this brief paper to learn about LimelightDELIVER, which is designed to accelerate rich media delivery to huge audiences, reducing the load on your infrastructure. LimelightDELIVER also accelerates delivery of standard web file formats, such as JPEG, GIF, JavaScript, CSS, and HTML. 
(ARTICLE) READ ABSTRACT |

Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security by Tripwire, Inc.

February 2011 - (Free Research)
Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches. 
(WHITE PAPER) READ ABSTRACT |

A Guide to PST Files - How Managing PSTS will Benefit Your Business by C2C Systems (UK)

May 2013 - (Free Research)
This whitepaper provides a complete guide to personal storage files. 
(WHITE PAPER) READ ABSTRACT |

Facilitating Enterprise PCI DSS Compliance - Detail Review by GlobalScape

April 2008 - (Free Research)
HS-PCI solution helps procedure and policy enforcement by monitoring and reporting on PCI DSS compliance by using prompts and warnings. 
(WHITE PAPER) READ ABSTRACT |

Symantec Backup Exec™ System Recovery 8: The Gold Standard in Complete Windows System Recovery by Symantec Corporation

March 2008 - (Free Research)
Symantec Backup Exec™ System Recovery 8 is the gold standard in complete Windows® system recovery, allowing businesses and IT to recover from system loss or disaster in minutes, not hours or days. 
(WHITE PAPER) READ ABSTRACT |

How to tackle risk taxonomy by ComputerWeekly.com

November 2010 - (Free Research)
This Technical Standard provides a taxonomy describing the factors that drive risk – their definitions and relationships. This Technical Standard is not a reference or tutorial on how to assess or analyze risk, as there are many such references already available. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 445 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts