Technical Documents InfrastructureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Technical Documents Infrastructure returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Storage Management
 •   IT Training and Certification
 •   Data Center Management
 •   Data Security
 •   Open Source
 •   Application Management and Maintenance
 •   Application Security
 •   Security Policies
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)

Related Searches
 •   Buy Technical
 •   Operations Technical
 •   Technical Documents Infrastructure Faqs
 •   Technical Documents Infrastructure Part
 •   Technical Needs
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Open Group technical document: IT Specialist Certification Accreditation Policy by ComputerWeekly.com

October 22, 2010 - (Free Research)
A common characteristic of people-certification programs in the marketplace is that most test or validate the existence of relevant knowledge. Few reach beyond this. 
(WHITE PAPER) READ ABSTRACT |

Open Group technical document: The Single Unix Specification by ComputerWeekly.com

October 25, 2010 - (Free Research)
This document is designed for users, developers, and implementors of open systems. It provides complete infor mation on what’s new in the Single UNIX Specification, Version 4, including POSIX.1-2008,with comprehensive reference material on every aspect. 
(WHITE PAPER) READ ABSTRACT |

CW+: Open Group technical document: IT Specialist Certification (ITSC) Conformance Requirements by ComputerWeekly.com

October 21, 2010 - (Free Research)
The Open Group IT Specialist Certification Program (the Program) is designed to validate the existence of those qualities and skills in a professional that enable the effective development, implementation, and operation of IT solutions. 
(WHITE PAPER) READ ABSTRACT |

Best Practices when implementing VMware vSphere in a Dell EqualLogic PS Series SAN Environment by Dell and VMware

November 13, 2013 - (Free Research)
This technical white paper details a set of best practices for configuring storage in a virtual environment. 
(WHITE PAPER) READ ABSTRACT |

XML Threat Model for REST, SOA and Web 2.0 by Intel

September 08, 2011 - (Free Research)
This technical document intended for Architects and Developers describes a comprehensive threat model for a new breed of threats based on XML content, including XML languages used in the Service Oriented Architecture (SOA) paradigm such as SOAP and the Web Services Description Language [WSDL]. 
(WHITE PAPER) READ ABSTRACT |

Best Practices when implementing VMware vSphere in a Dell EqualLogic PS Series SAN Environment by Dell, Inc.

October 22, 2013 - (Free Research)
This technical white paper details a set of best practices for configuring a virtual environment. 
(WHITE PAPER) READ ABSTRACT |

The Role of Technical Computing in IT and Big Data by IBM

November 13, 2013 - (Free Research)
This on-demand webcast examines how technical computing strategies can help you process, manage, and analyze growing data volumes and varieties. Tune in today to uncover the role of technical computing in IT and big data. 
(WEBCAST) READ ABSTRACT |

Postgres Plus® Technical Evaluation Guide by EnterpriseDB Corporation

June 15, 2010 - (Free Research)
This guide outlines the common steps that people go through when they are interested in evaluating an open source database (e.g. one or both of the Postgres Plus products). This guide will also provide links to other documents/collateral that will help you accomplish each step. Read on to learn about these common steps in evaluation in more detail. 
(WHITE PAPER) READ ABSTRACT |

JBoss Enterprise Middleware, by Red Hat: Technical Support Services Leader by Red Hat

November 01, 2011 - (Free Research)
This white paper discusses the features of JBoss Enterprise Middleware and highlights technical and customer support as the key characteristic that sets this middleware apart from the competition. 
(WHITE PAPER) READ ABSTRACT |

Smarter Planet Industry Solutions technical podcast series: Season 1 by IBM

October 21, 2011 - (Free Research)
Welcome to the IBM developerWorks Smarter Planet Industry Solutions technical podcast series, your source for technical discussions regarding IT solutions for your industry. Tune in every few weeks to hear a new expert discussion. 
(PODCAST) READ ABSTRACT |

E-Guide: Benefits and Drawbacks of Mainframe Technical Support Methods for the Web by CA Technologies.

December 01, 2010 - (Free Research)
This expert e-guide from SearchDataCenter.com explains various methods for solving technical support issues for the Web. Discover the advantages and drawbacks to each approach. And learn about serializing on the mainframe with compare-and-swap instruction. 
(EGUIDE) READ ABSTRACT |

Transitioning to LTE: Business and Technical Considerations by Alcatel-Lucent

November 30, 2010 - (Free Research)
LTE evolution is more than a move to a new technology. It encompasses a shift in the service provider’s business model to a more sustainable and profitable one. Read this presentation transcript to learn more!Trackback URL 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Proactive technical support: the overlooked essential in business resilience: Combine hardware and software technical support with business continuity and disaster recovery plans by IBM

October 25, 2011 - (Free Research)
Read this white paper and discover how IBM tech support solutions fit into every good resiliency plan and what to look for in a good business resilience vendor. 
(WHITE PAPER) READ ABSTRACT |

Oracle Solaris Optimized for Sun x86 Systems in the Enterprise by Oracle Corporation

July 31, 2010 - (Free Research)
This document is intended as a technical guide for developers and system administrators that want to understand the precise details of how Oracle Solaris and Oracle’s Sun x86 systems using Intel Xeon processor 5600 and 7500 series can improve your enterprise application solution environment. 
(WHITE PAPER) READ ABSTRACT |

Oracle Solaris Operating System: Optimized for Sun x86 Systems in the Enterprise by Oracle Corporation

July 01, 2010 - (Free Research)
This document is intended as a technical guide for developers and system administrators that want to understand the precise details of how Oracle® Solaris and Oracle’s Sun x86 systems using Intel® Xeon® processor 5600 and 7500 series can improve your enterprise application solution environment. 
(WHITE PAPER) READ ABSTRACT |

The 10 Worst Practices for Technical Support and How to Overcome Them by NTR Global

October 29, 2009 - (Free Research)
This white paper will explore 10 of the "worst practices" that are common to customer support operations. We will discuss how these worst practices can creep in to your contact center and ways to deal with them. We will also touch on how to eliminate well‐intentioned management blunders and discuss good and bad uses of support technology. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Vulnerability Management by SearchSecurity.com

June 03, 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state. 
(EBOOK) READ ABSTRACT |

How to tackle risk taxonomy by ComputerWeekly.com

November 25, 2010 - (Free Research)
This Technical Standard provides a taxonomy describing the factors that drive risk – their definitions and relationships. This Technical Standard is not a reference or tutorial on how to assess or analyze risk, as there are many such references already available. 
(WHITE PAPER) READ ABSTRACT |

E-Book: SAP upgrade tips and best practices by Panaya, Inc.

March 09, 2010 - (Free Research)
SAP upgrades are a perennial challenge - especially for organizations with many instances or customizations. The struggling economy has also made it difficult to make a case for a technical SAP ERP upgrade. Read this paper to learn about six SAP upgrade tips and best practices for global environments which can help avoid costly downtime and issues. 
(EBOOK) READ ABSTRACT |

E-Book: Technical Guide on PCI by SearchSecurity.com

October 10, 2011 - (Free Research)
TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance. 
(EBOOK) READ ABSTRACT |

Technical Report: Microsoft® SQL Server® Database Protection Using EqualLogic Auto-Snapshot Manager / Microsoft Edition by Dell, Inc.

May 02, 2011 - (Free Research)
This Technical Report describes using EqualLogic Auto-Snapshot Manager / Microsoft Edition to perform online Smart Copy protection and recovery for SQL Server 
(TECHNICAL ARTICLE) READ ABSTRACT |

Technical Guide on SIM: Moving beyond network security toward protecting applications by SearchSecurity.com

December 20, 2011 - (Free Research)
SIMs have been widely adopted for their value in correlating, reporting and alerting on network security. But SIMs can be used for more than just network security monitoring. The same tools can also bring value to application managers if used correctly. In this technical guide, gain 4 steps for integrating applications into enterprise SIMs. 
(EGUIDE) READ ABSTRACT |

February Technical Guide on Cloud Compliance by SearchSecurity.com

February 24, 2012 - (Free Research)
In this month’s Technical Guide from SearchCloudSecurity.com, gain a global perspective of today’s cloud compliance challenges. Explore key topics, including FedRAMP cloud computing standards, cloud security transparency, PCI in the cloud, Cloud Maturity Model (CMM) and more. 
(EGUIDE) READ ABSTRACT |

Antimalware: RFP Technology Decisions Guide

by SearchSecurity.com

April 18, 2012 - (Free Research)
<p>Part 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs. </p> 
(VIRTUAL SEMINAR) READ ABSTRACT |

Technical Guide on Mobile Security by SearchSecurity.com

November 01, 2011 - (Free Research)
Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts