Technical Documents InfrastructureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Technical Documents Infrastructure returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Storage Management
 •   IT Training and Certification
 •   Data Center Management
 •   Data Security
 •   Open Source
 •   Application Management and Maintenance
 •   Application Security
 •   Security Policies
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)

Related Searches
 •   History Technical
 •   New Technical Documents
 •   Policies Technical
 •   Server Technical Documents
 •   Technical Diagrams
 •   Technical Documents Arkansas
 •   Technical Documents Impact
 •   Technical Electronic
 •   Technical Firms
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Open Group technical document: IT Specialist Certification Accreditation Policy by ComputerWeekly.com

October 22, 2010 - (Free Research)
A common characteristic of people-certification programs in the marketplace is that most test or validate the existence of relevant knowledge. Few reach beyond this. 
(WHITE PAPER) READ ABSTRACT |

Open Group technical document: The Single Unix Specification by ComputerWeekly.com

October 25, 2010 - (Free Research)
This document is designed for users, developers, and implementors of open systems. It provides complete infor mation on what’s new in the Single UNIX Specification, Version 4, including POSIX.1-2008,with comprehensive reference material on every aspect. 
(WHITE PAPER) READ ABSTRACT |

CW+: Open Group technical document: IT Specialist Certification (ITSC) Conformance Requirements by ComputerWeekly.com

October 21, 2010 - (Free Research)
The Open Group IT Specialist Certification Program (the Program) is designed to validate the existence of those qualities and skills in a professional that enable the effective development, implementation, and operation of IT solutions. 
(WHITE PAPER) READ ABSTRACT |

Best Practices when implementing VMware vSphere in a Dell EqualLogic PS Series SAN Environment by Dell, Inc.

October 22, 2013 - (Free Research)
This technical white paper details a set of best practices for configuring a virtual environment. 
(WHITE PAPER) READ ABSTRACT |

Best Practices when implementing VMware vSphere in a Dell EqualLogic PS Series SAN Environment by Dell and VMware

November 13, 2013 - (Free Research)
This technical white paper details a set of best practices for configuring storage in a virtual environment. 
(WHITE PAPER) READ ABSTRACT |

XML Threat Model for REST, SOA and Web 2.0 by Intel

September 08, 2011 - (Free Research)
This technical document intended for Architects and Developers describes a comprehensive threat model for a new breed of threats based on XML content, including XML languages used in the Service Oriented Architecture (SOA) paradigm such as SOAP and the Web Services Description Language [WSDL]. 
(WHITE PAPER) READ ABSTRACT |

The Role of Technical Computing in IT and Big Data by IBM

November 13, 2013 - (Free Research)
This on-demand webcast examines how technical computing strategies can help you process, manage, and analyze growing data volumes and varieties. Tune in today to uncover the role of technical computing in IT and big data. 
(WEBCAST) READ ABSTRACT |

Postgres Plus® Technical Evaluation Guide by EnterpriseDB Corporation

June 15, 2010 - (Free Research)
This guide outlines the common steps that people go through when they are interested in evaluating an open source database (e.g. one or both of the Postgres Plus products). This guide will also provide links to other documents/collateral that will help you accomplish each step. Read on to learn about these common steps in evaluation in more detail. 
(WHITE PAPER) READ ABSTRACT |

JBoss Enterprise Middleware, by Red Hat: Technical Support Services Leader by Red Hat

November 01, 2011 - (Free Research)
This white paper discusses the features of JBoss Enterprise Middleware and highlights technical and customer support as the key characteristic that sets this middleware apart from the competition. 
(WHITE PAPER) READ ABSTRACT |

Smarter Planet Industry Solutions technical podcast series: Season 1 by IBM

October 21, 2011 - (Free Research)
Welcome to the IBM developerWorks Smarter Planet Industry Solutions technical podcast series, your source for technical discussions regarding IT solutions for your industry. Tune in every few weeks to hear a new expert discussion. 
(PODCAST) READ ABSTRACT |

E-Guide: Benefits and Drawbacks of Mainframe Technical Support Methods for the Web by CA Technologies.

December 01, 2010 - (Free Research)
This expert e-guide from SearchDataCenter.com explains various methods for solving technical support issues for the Web. Discover the advantages and drawbacks to each approach. And learn about serializing on the mainframe with compare-and-swap instruction. 
(EGUIDE) READ ABSTRACT |

The 10 Worst Practices for Technical Support and How to Overcome Them by NTR Global

October 29, 2009 - (Free Research)
This white paper will explore 10 of the "worst practices" that are common to customer support operations. We will discuss how these worst practices can creep in to your contact center and ways to deal with them. We will also touch on how to eliminate well‐intentioned management blunders and discuss good and bad uses of support technology. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Vulnerability Management by SearchSecurity.com

June 03, 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state. 
(EBOOK) READ ABSTRACT |

Transitioning to LTE: Business and Technical Considerations by Alcatel-Lucent

November 30, 2010 - (Free Research)
LTE evolution is more than a move to a new technology. It encompasses a shift in the service provider’s business model to a more sustainable and profitable one. Read this presentation transcript to learn more!Trackback URL 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Proactive technical support: the overlooked essential in business resilience: Combine hardware and software technical support with business continuity and disaster recovery plans by IBM

October 25, 2011 - (Free Research)
Read this white paper and discover how IBM tech support solutions fit into every good resiliency plan and what to look for in a good business resilience vendor. 
(WHITE PAPER) READ ABSTRACT |

Oracle Solaris Optimized for Sun x86 Systems in the Enterprise by Oracle Corporation

July 31, 2010 - (Free Research)
This document is intended as a technical guide for developers and system administrators that want to understand the precise details of how Oracle Solaris and Oracle’s Sun x86 systems using Intel Xeon processor 5600 and 7500 series can improve your enterprise application solution environment. 
(WHITE PAPER) READ ABSTRACT |

Oracle Solaris Operating System: Optimized for Sun x86 Systems in the Enterprise by Oracle Corporation

July 01, 2010 - (Free Research)
This document is intended as a technical guide for developers and system administrators that want to understand the precise details of how Oracle® Solaris and Oracle’s Sun x86 systems using Intel® Xeon® processor 5600 and 7500 series can improve your enterprise application solution environment. 
(WHITE PAPER) READ ABSTRACT |

How to tackle risk taxonomy by ComputerWeekly.com

November 25, 2010 - (Free Research)
This Technical Standard provides a taxonomy describing the factors that drive risk – their definitions and relationships. This Technical Standard is not a reference or tutorial on how to assess or analyze risk, as there are many such references already available. 
(WHITE PAPER) READ ABSTRACT |

E-Book: SAP upgrade tips and best practices by Panaya, Inc.

March 09, 2010 - (Free Research)
SAP upgrades are a perennial challenge - especially for organizations with many instances or customizations. The struggling economy has also made it difficult to make a case for a technical SAP ERP upgrade. Read this paper to learn about six SAP upgrade tips and best practices for global environments which can help avoid costly downtime and issues. 
(EBOOK) READ ABSTRACT |

Technical Report: VDI Reference Architecture with Cisco, VMware, and Nimble Storage by Nimble Storage

May 31, 2013 - (Free Research)
Learn how to deploy 1,000 virtual desktops using VMware View 5.1 with VMware vSphere 5, Cisco UCS, and a single 3U Nimble Storage array. 
(WHITE PAPER) READ ABSTRACT |

Technical Computing Benefits with IBM FlashSystem by IBM

April 30, 2013 - (Free Research)
This white paper explains why high performance computing (HPC) systems generate and consume massive amounts of data that are hungry for high storage performance, and explores the technical computing benefits offered from a major vendor's comprehensive flash portfolio. 
(WHITE PAPER) READ ABSTRACT |

VERDE 5.0 Technical Overview by Virtual Bridges

December 02, 2010 - (Free Research)
In this webcast you will learn about VERDE 5.0, a desktop virtualization management solution that combines offline, online and branch VDI to remove the management burden, complexity and cost normally associated with desktop virtualization. 
(WEBCAST) READ ABSTRACT |

The Technical Complexities and Risks of Public Key Authentication: The Lack of SSH User Key Management in Large Enterprises Today by SSH Communications Security Corp.

May 21, 2012 - (Free Research)
While SSH (Secure Shell) user keys are often used for granting system access for system administrators, many organizations lack the proper processes for effectively managing them, introducing a number of security risks. This paper highlights ten (10) technical challenges and risks related to public key authentication and how to address them. 
(WHITE PAPER) READ ABSTRACT |

May Technical Guide on PCI DSS Guidance by SearchSecurity.com

May 07, 2012 - (Free Research)
This technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies. 
(EGUIDE) READ ABSTRACT |

Technical Guide on Mobile Security by SearchSecurity.com

November 01, 2011 - (Free Research)
Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts