Foreign PatentWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Foreign Patent returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Storage Management
 •   Disk-based Backup & Storage/ RAID
 •   Storage Security
 •   Virtualization
 •   Application Management and Maintenance
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Backup Systems and Services
 •   Database Administration
 •   Data Quality

Related Searches
 •   Definition Of Foreign Patent
 •   Firms Foreign Patent
 •   Foreign Computers
 •   Foreign Patent Distributions
 •   Foreign Patent Iowa
 •   Foreign Patent Policies
 •   Foreign Patent Utility
 •   Foreign Supply
 •   Guideline Foreign Patent
 •   Purchasing Foreign Patent
Advertisement

ALL RESULTS
1 - 25 of 47 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs by FireEye

December 31, 2013 - (Free Research)
This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks. 
(WHITE PAPER) READ ABSTRACT |

Fulfilling The Promise of Desktop Virtualization With GreenBytes' Patented Breakthrough Deduplication by GreenBytes

July 26, 2013 - (Free Research)
This whitepaper will help you learn about a patented zero latency inline deduplication solution that has been designed to break down the barriers of desktop virtualization. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Rally Software: Release Planning Guide by Rally Software

May 28, 2013 - (Free Research)
Agile development might seem like a foreign language if you're new to the game - with a new set of roles and terminology, it's not surprising that you might be a little confused. In this quick, helpful guide, learn about one of the key concepts in agile methodology - release planning. Discover what it is, who does it, and why it's important. 
(WHITE PAPER) READ ABSTRACT |

Deliver Application-level Security at Data Center Performance Levels by Check Point Software Technologies Ltd.

September 2008 - (Free Research)
The shift from network-layer attacks to dynamically changing application-layer threats has dramatically increased security needs. This paper examines appliances that can quickly evolve to guarantee performance yet maintain a high level of security. 
(WHITE PAPER) READ ABSTRACT |

CW Europe – February Edition by ComputerWeekly.com

February 2013 - (Free Research)
Many analysts are predicting that tablets will outsell laptops, this year, and become the most popular type of portable computer device. In this issue of CW Europe we take a look at tablet security, through a range of case studies, highlighting the benefits and downfalls of mobile computing. 
(EZINE) READ ABSTRACT |

E-Book: NERC Compliance by SearchSecurity.com

September 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation. 
(EBOOK) READ ABSTRACT |

Proofpoint Messaging Security Gateway Virtual Edition by Proofpoint, Inc.

November 2006 - (Free Research)
VMware virtualization products require alternative messaging security solutions than those that support physical server software. This free trial download provides best-in-class messaging security designed specifically to support VMware products. 
(TRIAL SOFTWARE) READ ABSTRACT |

Asset and service management solutions to manage government assets by IBM

April 2011 - (Free Research)
Read this brochure and find out how IBM Maximo Asset Management helps government agencies address accountability with asset optimization. 
(BROCHURE) READ ABSTRACT |

Achieving Profitable Growth through Exceptional Customer Experience by CA Technologies.

November 2008 - (Free Research)
In this whitepaper, Datamonitor focuses on nine key steps that can - and should - be taken by CSPs to improve standards by delivering outstanding service and achieving various objectives. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Scaling a Big Data Analytics Project by Information Builders

May 2013 - (Free Research)
Big data analytics can be overwhelming for those just beginning, but it's fortunate that many traditional data management best practices are also applicable to big data. In this expert e-guide, discover which best practices easily translate to your big data project, and get advice on how to start, scale, and succeed with your analytics initiative. 
(EGUIDE) READ ABSTRACT |

How to tackle secure protocols and mobile management by ComputerWeekly.com

November 2010 - (Free Research)
For a truly mobile device, operating to de-perimeterised principles, a wireless connection is probably required to achieve optimal connectivity while roaming. 
(WHITE PAPER) READ ABSTRACT |

Meeting the Requirements of DoD Directive 8570.1 by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The Department of Defense's manual, DoD 8570.01-M Information Assurance Workforce Improvement Program, supports DoD Directive 8570.1, which requires all individuals possessing privileged access to a DoD Information System (IS) to be trained and certified in the secure operation of computer systems used throughout the DoD's Global Information Grid. 
(WHITE PAPER) READ ABSTRACT |

Xiotech Emprise 5000 and Citrix XenServer 5.5.0 by Xiotech Corporation

June 2010 - (Free Research)
Xiotech's Emprise 5000 system is a revolutionary concept in data storage. It is built on patented Intelligent Storage Element (ISE) technology and provides a perfectly balanced building block of performance, reliability, and scalability that delivers the lowest total cost of ownership of any SAN or SAN-like storage system on the market. 
(WHITE PAPER) READ ABSTRACT |

Woods Gain Advanced Web Filtering Technology with Bloxx by Bloxx, Inc.

September 2008 - (Free Research)
The Bloxx Web filtering appliance with Tru-View Technology combines the best of traditional methods with its patented language analysis and intelligent identification techniques, providing three levels of protection. 
(WHITE PAPER) READ ABSTRACT |

ExaGrid: Cost-Effective Disk-Based Backup by ExaGrid Systems, Inc.

April 2011 - (Free Research)
The ExaGrid system is a plug-and-play disk backup appliance that works with existing backup applications. ExaGrid’s patented zone-level deduplication technology minimizes the amount of data to be stored by storing only the unique bytes across backups instead of storing the redundant data. Read on to learn more today! 
(DATA SHEET) READ ABSTRACT |

IBM ProtecTIER Deduplication Solutions by IBM

May 2011 - (Free Research)
IBM ProtecTIER Deduplication solutions, featuring revolutionary and patented HyperFactor data deduplication technology, provide enterprise-class performance, scalability, and proven enterprise-level data integrity to meet the disk-based data protection needs of the enterprise data center down to mid-market environments. 
(MICROSITE) READ ABSTRACT |

HP Dynamic Deduplication - achieving a 50:1 ratio by Hewlett-Packard Company

March 2009 - (Free Research)
In 2008, HP introduced two products to the HP StorageWorks D2D Backup System Family. Both feature Dynamic deduplication based on an HP-patented algorithm that packs up to 50 times more backup data into the same disk footprint. This paper explains how Dynamic deduplication works and also establishes how a 50:1 deduplication ratio may be achieved. 
(WHITE PAPER) READ ABSTRACT |

Dell Automated Deployment by Dell, Inc. and Microsoft Windows 7

August 2010 - (Free Research)
Dell Services has developed patent pending technology and processes that automates the PC provisioning process which can greatly reduce the overall cost associated with PC deployments. Read this data sheet to learn more! 
(DATA SHEET) READ ABSTRACT |

Inside the Dell Equallogic™ PS Series iSCSI Storage Arrays by Dell India

July 2008 - (Free Research)
Built on patented peer storage architecture, the Dell EqualLogic PS Series of Internet SCSI (iSCSI) storage arrays offer high performance, reliability, intelligent automation, and seamless virtualization of storage to enable simplified enterprise storage deployment and management, and comprehensive data protection. 
(BROCHURE) READ ABSTRACT |

The Force.com Multitenant Architecture: Understanding the Design of Salesforce.com's Internet Application Development Platform by Salesforce.com

March 2009 - (Free Research)
To meet the extreme demands of its large user population, Force.com's foundation is a metadatadriven software architecture that enables multitenant applications. This paper explains the patented technology that makes the Force.com platform fast, scalable, and secure for any type of application. 
(WHITE PAPER) READ ABSTRACT |

Vital records: The 5% linked to compliance, operations, & enterprise survival by Iron Mountain

March 2012 - (Free Research)
This paper will help you discover what your vital records are through a list of questions you should ask yourself in determining which records fall into this category. You also will learn about the inherent risks associated with inadequate preservation and how to implement an effective and efficient vital records program for your organization. 
(WHITE PAPER) READ ABSTRACT |

DATA ARCHIVING : The first Step toward Managing the Information Lifecycle by Dolphin

October 2009 - (Free Research)
This whitepaper discusses the business case for data archiving as the first step in an SAP ILM strategy; strategies for Data Archiving, Retention Management and the Retention Warehouse strategy for legacy decommissioning in SAP; and Dolphin's best‐practices approach to an effective, long‐term ILM strategy. 
(WHITE PAPER) READ ABSTRACT |

Emprise™ 5000: High-performance, low-cost storage building block by Xiotech Corporation

June 2010 - (Free Research)
Read this white paper to learn more about the Xiotech’s Emprise 5000 system, a revolutionary concept in data storage offering the lowest total cost of ownership (TCO) of any storage area network (SAN) or SAN-like system on the market. 
(PRODUCT OVERVIEW) READ ABSTRACT |

State of Internet Security, Q3 - Q4 2009 by Websense, Inc.

February 2010 - (Free Research)
Do you know just how adept Web adversaries have become in using the Internet to spread malware in their attacks? Understand where the true threats lie with this report which summarizes the significant findings of Websense researchers using the ThreatSeeker™ Network during the six-month period ending December 2009. 
(WHITE PAPER) READ ABSTRACT |

ROI Case Study: Intacct Emergent Game Technologies by Intacct Corporation

March 2010 - (Free Research)
Emergent needed an accounting application that would enable it to reconcile multiple currencies across its multiple subsidiaries, reduce manual data entry and monthly consolidation processes, and streamline revenue management. Continue reading to learn how Emergent chose Intacct for the financial management solution. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 47 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts