Hardware Articles ElectronicWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Hardware Articles Electronic returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Storage Management
 •   Data Center Management
 •   Application Servers
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Disaster Recovery
 •   Web Services
 •   Operating Systems and Subsystems
 •   Social Networks and Community Management
 •   Disk-based Backup & Storage/ RAID

Related Searches
 •   Accessing Hardware Articles Electronic
 •   Expense Hardware Articles
 •   Hardware Articles Cycles
 •   Hardware Articles Definition
 •   Hardware Articles Electronic Info
 •   Hardware Articles Electronic Small
 •   Hardware Process
 •   Net Hardware
 •   Risks Hardware
 •   Webinars Hardware Articles Electronic
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

Fair exchange protocols with anonymity and non-repudiation for payments by ComputerWeekly.com

May 02, 2013 - (Free Research)
This article in our Royal Holloway Information Security series looks in detail at two key principles necessary for secure payments: fair exchange and non-repudiation. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Gartner: Context-aware computing by ComputerWeekly.com

June 01, 2012 - (Free Research)
Gartner analysts, William Clark, David W Cearley and Avivah Litan, explain how business can exploit context-aware computing and social media. 
(ANALYST BRIEF) READ ABSTRACT |

eBook: IT in the Electronic Hospital by SearchCIO.com and SearchSecurity.com

October 19, 2009 - (Free Research)
The federal government's push for electronic healthcare records has made data security even more pressing. This eBook takes a look at where healthcare IT leaders should begin and what they should watch out for as they move to embrace the HITECH Act and other initiatives. Read on to learn more. 
(EBOOK) READ ABSTRACT |

E-Book: IT in the Electronic Hospital by Imprivata

February 11, 2010 - (Free Research)
The federal government's push for electronic healthcare records has made data security even more pressing. This eBook takes a look at where healthcare IT leaders should begin and what they should watch out for as they move to embrace the HITECH Act and other initiatives. Read on to learn more. 
(EBOOK) READ ABSTRACT |

Your Business May Be Part of a Network - But Is It Truly Connected? by Crossgate

April 08, 2010 - (Free Research)
Business networks are key to competitive advantage. How businesses connect and communicate with partners in their business networks is important in this global economy. This article offers suggestions and examples of how to avoid getting bogged down in maintaining a business partner network and instead focuses on a business’s key differentiators. 
(WHITE PAPER) READ ABSTRACT |

Beyond Backup Ezine: Disaster Recovery Strategies for Branch Offices by CIO Decisions

July 09, 2009 - (Free Research)
The July/August issue of CIO Decisions Ezine focuses on disaster recovery in remote and branch offices, especially in midmarket organizations. Read this issue to learn some great tips and techniques for increasing your remote workers' ability to bounce back after an unfortunate event. 
(EZINE)

Using Predictive Coding to Your E-Discovery Advantage by SearchCIO.com

May 23, 2013 - (Free Research)
E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes. 
(EZINE) READ ABSTRACT |

Sedona Conference® Commentary On Legal Holds: The Trigger & The Process by ZANTAZ

January 2008 - (Free Research)
This Article, intended to provide guidance on those issues, is divided into two parts: The "trigger" and the "legal hold." 
(WHITE PAPER) READ ABSTRACT |

The Human Face of Big Data: Data Driven by ComputerWeekly.com

January 2013 - (Free Research)
Software engineers are transforming the daily lives of hundreds of millions of people for good and for ill, writes Jonathan Harris. 
(BOOK) READ ABSTRACT |

Reducing the Cost of Electronic Gaming Machine Support with Intel® vPro™ Technology by Wipro Technologies

February 2009 - (Free Research)
This paper illustrates the expected cost savings of deploying this technology to support electronic gaming operations. 
(ARTICLE) READ ABSTRACT |

Cloud Computing for the Enterprise-- Part 1: Capturing the Cloud by IBM

September 2010 - (Free Research)
Read this article from IBM to discover the details behind the definition: cloud computing is an all-inclusive solution in which all computing resources (hardware, software, networking, storage, and so on) are provided rapidly to users as demand dictates. 
(WHITE PAPER) READ ABSTRACT |

Server Optimization, Hardware and Virtualization by Dell, Inc. and Microsoft

January 2012 - (Free Research)
In this expert e-guide, find out how to optimize SQL Server with the right choices for hardware, storage devices, and virtualization. Inside, find articles on: what not to do when purchasing hardware; if solid-state storage devices are worth the cost; hardware and risk considerations for an inevitable virtualization initiative. 
(EGUIDE) READ ABSTRACT |

The Next Frontier for Virtualization: Over-Utilized Systems: Identifying and eliminating the most critical and costly constraints from the enterprise software development and testing lifecycle by iTKO LISA

October 2010 - (Free Research)
This article explains the utilization patterns in enterprise IT environments, and which type of Virtualization (Hardware or Service virtualization or both) should be applied to receive the greatest value. This paper discusses how to apply the principle of under and over-utilization to apply the right type of virtualization for business needs. 
(WHITE PAPER) READ ABSTRACT |

Sharepoint E-zine Vol.1: Governance Implementation Management by SearchWinIT

August 2008 - (Free Research)
SearchWinIT.com's SharePoint e-zine – is a monthly Web magazine packed with in-depth articles and tips written by SharePoint to make you a SharePoint master. Our editorial focuses on three main areas: governance, management and implementation. 
(EZINE) READ ABSTRACT |

Forum Sentry™ - Web Services Security Gateway - Drive Return on Investment by Forum Systems

Forum Sentry™ provides a security infrastructure that drives a return on investment by enabling secure XML and Web services communications for mission critical applications. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

CW Europe - November Edition by ComputerWeekly.com

November 2012 - (Free Research)
The November 2012 edition of CWEurope focuses on what should always be one of your top IT priorities: Disaster recovery. Without a plan B, you risk the continuance of your business in the event of a natural disaster, hardware malfunction, human error or digital threat. It's disaster recovery or disaster devastation - the choice is up to you. 
(EZINE) READ ABSTRACT |

Article: How end-to-end services can transform Oracle environments by Dell, Inc.

April 2011 - (Free Research)
The creation of the Dell Services Oracle Practice builds on the long and successful relationship between Dell and Oracle - a collaboration that can offer significant benefits to organizations running Oracle software on Dell hardware. Read this article for more. 
(WHITE PAPER) READ ABSTRACT |

Gartner: How to build an online community by ComputerWeekly.com

February 2014 - (Free Research)
Gartner analyst Julie Hopkins explains seven ways to lure people to participate in online communities and shows how to choose the tactics that will best suit your business needs. 
(ANALYST BRIEF) READ ABSTRACT |

DocuSign - Electronic Signature Services by DocuSign, Inc.

DocuSign is a secure and convenient way to get a legally binding electronic signature. It's fast and easy-to-use. For businesses, DocuSign can dramatically increase efficiency and accelerate growth while reducing administrative costs. 
(ASP)

Preparing for IBM PureApplication System: Article series on onboarding your applications by IBM

April 2012 - (Free Research)
This 5-part series offers key tips and tools that can help prepare your organization for a workload optimized, integrated hardware and software appliance. Discover how to quickly on-board your applications so you can get the most from this advanced system. 
(WHITE PAPER) READ ABSTRACT |

Ten Signs That You Need a Server by Dell, Inc. and Intel®

December 2009 - (Free Research)
If you'e a small or medium business owner with more than one computer, it's time to consider investing in a server. A server will keep your data secure and organized and will help you run your business more efficiently and professionally. If you've reached one of the 10 thresholds in this article, a server could do your business a world of good. 
(JOURNAL ARTICLE) READ ABSTRACT |

An Introductory Breakdown of Trusted Computing by Intel

December 2008 - (Free Research)
This technical article provides an introduction to Trusted computing and its components, and is an comprehensive primer to IT departments evaluating security at the platform level. 
(TECHNICAL ARTICLE)

Sorting Out Hardware, Software and Hypervisor-Based Replication by SearchDisasterRecovery.com

April 2014 - (Free Research)
One increasingly popular alternative to traditional data backup is to combine replication and snapshots to continuously protect data. This handbook compares hardware-based and software-based replication so you can decide which approach suits your organization's needs, and discusses the emergence of hypervisor-based replication. 
(EBOOK) READ ABSTRACT |

Upgrading to Windows Vista: Is Your Hardware Ready? Are You? by Global Knowledge Network, Inc.

January 2008 - (Free Research)
Windows Vista is here. This white paper will help you help you determine if your hardware is compatible and which version you should implement. 
(WHITE PAPER) READ ABSTRACT |

Server Virtualization: Expert Overview of Costs, Trends and More by Dell, Inc.

November 2011 - (Free Research)
Understanding the costs and trends associated with server virtualization is very important, as well as understanding the role of virtual platforms for your business. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts