Guidelines DatabaseWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Guidelines Database returned the following results.
RSS What is RSS?
Related Categories

 •   Storage Management
 •   Virtualization
 •   Data Security
 •   Data Center Management
 •   Storage Security
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Disk-based Backup & Storage/ RAID
 •   Security Policies
 •   Backup Systems and Services
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Active Guidelines
 •   Designing Guidelines
 •   Devices Guidelines Database
 •   Guidelines Database Monitor
 •   Guidelines Database Oklahoma
 •   Hr Guidelines Database
 •   Plan Guidelines
 •   Support Guidelines Database
 •   Video Guidelines Database
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Whitepaper: Dell Storage Selection Guidelines for Oracle Databases by Dell, Inc.

May 02, 2011 - (Free Research)
Dell strives to simplify IT in order to reduce complexity in data centers and has a broad storage product portfolio to meet database customers' needs. These storage selection guidelines will help administrators choose an appropriate storage technology based on their requirements. 
(WHITE PAPER) READ ABSTRACT |

SearchCompliance.com E-guide: A lesson in database security: What every compliance officer needs to know by IBM

August 24, 2011 - (Free Research)
Too many enterprise databases are leaking sensitive information. Yet the solution to these problems is simple: user education, coupled with a new breed of database activity monitoring tools. This e-guide provides guidelines for establishing a data protection framework and teaching the right way to handle data. 
(EGUIDE) READ ABSTRACT |

Guidelines for the Evaluation of Enterprise De-Duplication Solutions: How to Navigate the Pitfalls and Hyperbole by IBM

April 01, 2009 - (Free Research)
This document is not intended to judge what is good or bad, right or wrong. The primary focus is educational, providing a background on the principles of de-duplication and recommendations to consider in planning an evaluation of de-duplication solutions. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Implementing Storage Virt: Guidelines & Factors to Consider by Hewlett-Packard Company

August 24, 2011 - (Free Research)
This SearchVirtualStorage.com E-Guide can help clarify by outlining 4 guidelines for implementing storage virtualization and by divulging factors to consider before deploying storage virt into your IT infrastructure. 
(EGUIDE) READ ABSTRACT |

Create Supported SQL Server 2008 Virtual Machines -- Rely on Server Virtualization to run SQL Server 2008 by Dell, Inc. and Intel®

September 01, 2008 - (Free Research)
The support team for Microsoft SQL Server has published guidelines for virtualizing this database engine. Read this paper to learn how to move forward with the process and create supported SQL Server virtual machines (VMs) that can be hosted on Dell PowerEdge servers. 
(WHITE PAPER) READ ABSTRACT |

Backup and Recovery for Oracle Database 11g with EMC Deduplication by EMC Corporation

November 07, 2011 - (Free Research)
This white paper provides guidelines for the use of EMC Data Domain deduplication for Oracle Recovery Manager backup over a Network File System mount. 
(WHITE PAPER) READ ABSTRACT |

Deploying Microsoft SQL Server 2005 with Microsoft Windows Server 2008 on Dell PowerEdge Servers and Dell Storage by Dell, Inc.

August 2008 - (Free Research)
This white paper provides an architectural overview and configuration guidelines for deploying Microsoft SQL Server 2005 x64 SP2 with Microsoft Windows Server® 2008 x64 Enterprise or Standard Edition on Dell PowerEdge servers with Dell PowerVault. 
(WHITE PAPER) READ ABSTRACT |

Oracle 10gR2 Databases on Hitachi NAS Platform, Powered by BlueArc by Hitachi Data Systems

September 2009 - (Free Research)
The Hitachi NAS Platform, powered by BlueArc, delivers a high-performance, intelligent and scalable multiprotocol solution. This document describes best practices for using Oracle databases on Linux with NAS connectivity provided by the Hitachi NAS Platform through the NFS protocol. 
(WHITE PAPER) READ ABSTRACT |

Guidelines for Specification of Data Center Criticality / Tier Levels by Schneider Electric

January 2011 - (Free Research)
This paper describes and compares three common methods for specifying data center criticality. Guidance is given on how to choose a criticality by presenting typical levels for various applications and environments. Defensible approaches for specifying data center performance are also discussed. 
(WHITE PAPER) READ ABSTRACT |

Best Practices: Dell Compellent Storage Center Microsoft Exchange Server 2010 by Dell, Inc.

January 2012 - (Free Research)
This reference paper provides guidelines for utilizing and configuring Dell Compellent Storage Center with Exchange Server 2010. 
(WHITE PAPER) READ ABSTRACT |

Virtualizing Oracle with EMC and VMware by EMC Corporation & VMware, Inc.

May 2011 - (Free Research)
This session provides best practice and solution guidelines to successfully architect and deploy Oracle databases on the EMC and VMware platform. 
(VIDEO) READ ABSTRACT |

5 Mistakes Auditing Virtual Environments (You Don't Want to Make) by HyTrust

July 2011 - (Free Research)
Read this expert guide to ensure your virtual environment is in compliance with PCI DSS 2.0 and avoid common errors made in the auditing process. 
(WHITE PAPER) READ ABSTRACT |

The Critical Security Controls – Moving Beyond the Checklist Mentality by Lumension

August 2009 - (Free Research)
The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization. 
(PODCAST) READ ABSTRACT |

Information Security Magazine - December 2009 / January 2010: Basic Database Security by Information Security Magazine

December 2009 - (Free Research)
This issue of information security magazine provides a step-by-step guide to securing database systems, explores the important factors in selecting a SaaS provider, presents a whole new approach to security management that has nothing to do with structure-driven policy architecture, and more. 
(EZINE)

HPC Storage: Taming the Data Torrent by Dell, Inc. and Intel®

August 2011 - (Free Research)
Check out this latest issue of HPC source to learn about the current state of high performance computing and what top experts predict for the coming decade. 
(EZINE)

Rack Powering Options for High Density by APC by Schneider Electric

July 2009 - (Free Research)
In this APC whitepaper, alternatives for providing electrical power to high density racks in data centers and network rooms are explained and compared as well as defined guidelines for rack power systems that can reliably deliver power to high density loads while adapting to changing needs. 
(WHITE PAPER) READ ABSTRACT |

Migrating From UNIX/ RISC To Red Hat Enterprise Linux® On Intel® Processor-Based Servers by Red Hat and Intel

August 2009 - (Free Research)
Red Hat Enterprise Linux running on Intel® processor-based servers is helping companies cut TCO by up to 50 percent and more versus comparable UNIX/RISC solutions, while providing a better foundation for growth. This white paper outlines the key benefits of migration and provides a step-by-step guide to conducting a successful transition. 
(WHITE PAPER) READ ABSTRACT |

Five Procurement Guidelines You Can't Afford to Ignore by StarCite

August 2008 - (Free Research)
Here is a list of 5 guidelines that companies should keep in mind as they create their spend management program: Data Consolidation, Preferred Vendor Program, Legal Oversight, Company-wide Visibility and Coordination. 
(WHITE PAPER) READ ABSTRACT |

Best Practice Guidelines for SAP Solutions on VMware® Infrastructure by VMware, Inc.

October 2008 - (Free Research)
This paper provides best practice guidelines for deploying SAP software solutions on VMware Infrastructure 3. 
(WHITE PAPER) READ ABSTRACT |

Best Practice Guidelines for SAP Solutions on VMware® Infrastructure by VMware and Intel

October 2008 - (Free Research)
This paper provides best practice guidelines for deploying SAP software solutions on VMware Infrastructure 3. 
(WHITE PAPER) READ ABSTRACT |

Making a Strategic Business Intelligence Choice - A Checklist by Business Objects

March 2008 - (Free Research)
This white paper focuses on the factors your organization should consider when selecting a BI vendor and establishing its products as its BI standard. 
(ANALYST REPORT) READ ABSTRACT |

Power and Cooling Design Guidelines for Network Access Rooms by Emerson Network Power

December 2008 - (Free Research)
Explore this in-depth resource to learn about critical guidelines to help you design power and cooling systems so you can maintain your network's efficiency, power use, temperature, and overall structural hardware integrity. Read on now to learn more. 
(WHITE PAPER) READ ABSTRACT |

UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES by SearchSecurity.com

September 2013 - (Free Research)
This expert guide from SearchSecurity.com discusses the new Payment Card Industry (PCI) Mobile Payment Acceptance Security Guidelines and examines how to ensure compliance in a world where mobile payment has become ingrained into everyday life. 
(EGUIDE) READ ABSTRACT |

Five data protection guidelines for business continuity - Presentation Transcript by Dell, Inc.

September 2012 - (Free Research)
Jon William Toigo covers data protection guidelines, including mirroring, tape backup and WAN-based replication technologies. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Identity and Access Management Guidelines by Radiant Logic, Inc.

May 2014 - (Free Research)
This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts