Types OperatingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Types Operating returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Center Management
 •   Operating Systems and Subsystems
 •   Enterprise Systems Management
 •   Desktop Management
 •   Storage Management
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Business Intelligence Solutions
 •   Network Management
 •   Disaster Recovery

Related Searches
 •   Reviews Types Operating
 •   Speed Types Operating
 •   Types Intranet
 •   Types Operating Arkansas
 •   Types Operating Environment
 •   Types Operating Montana
 •   Types Operating Outsourcing
 •   Types Operating Sales
 •   Types Operating Statistics
 •   Types Operating Tool
Advertisement

ALL RESULTS
1 - 25 of 454 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Virtualization Defined - Eight Different Ways by F5 Networks

September 2008 - (Free Research)
Virtualization is not a new concept. Today it appears that virtualization is everywhere, which because of its ambiguity can be applied to any and all parts of an IT infrastructure. This whitepaper focuses on virtualization in the data center. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: What the Cloud Brings to Windows Server 2012 by Dell and Microsoft

August 2012 - (Free Research)
This expert e-guide explains how Windows Server 2012 makes it possible to run Active Directory in the cloud. Explore the new capabilities this new operating system brings with it and find out how closely it resembles Windows Azure public cloud. 
(EGUIDE) READ ABSTRACT |

Nucleus RTOS by Mentor Graphics

April 2009 - (Free Research)
Complex microprocessors lie at the heart of every electronic device and embedded system in use today - from mobile phones to brain scanners. Such products demand sophisticated software to get the job done, and that's where operating systems come in. 
(DEMO) READ ABSTRACT |

Optim™ Data Privacy Solution by IBM

The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments. By substituting fictionalized yet realistic data for confidential information, Optim enables sites to test effectively while supporting privacy compliance initiatives. 
(SOFTWARE PRODUCT)

Agentless Architecture: Agentless Backup is Not a Myth by Asigra

April 2009 - (Free Research)
Agentless backup is NOT a myth. The Asigra solution is proof because it requires no agents, which inherently makes it easier to install and support than legacy backup and recovery solutions. This paper serves as an introduction to Asigra's Hybrid Cloud Backup and Recovery Software. 
(WHITE PAPER) READ ABSTRACT |

Automated, Standardized, and Private Cloud Management by Novell, Inc.

October 2010 - (Free Research)
This iView describes the types of operational changes IT teams need to make in order to benefit from the promise of private-cloud architectures, and identifies a key set of capabilities and attributes to look for when considering management tools to help implement, automate, and operate these environments. 
(TRANSCRIPT) READ ABSTRACT |

Rewriting the rules of Patch Management by IBM

July 2011 - (Free Research)
IBM Tivoli Endpoint Manager helps organizations automatically manage patches for multiple operating systems and applications across hundreds of thousands of endpoints regardless of location, connection type or status. 
(WHITE PAPER) READ ABSTRACT |

Dell Compellent Storage Center AIX 5.2, 5.3, 6.1 and 7.1 by Dell, Inc.

April 2012 - (Free Research)
The full range of AIX supplied utilities such as mirroring, backup, multiple file system types, multipath, boot from SAN and disaster recovery are used with Dell Compellent volumes. Read this comprehensive white paper to fully explore AIX best practices. 
(WHITE PAPER) READ ABSTRACT |

UPS Operating Modes: A Global Standard by Liebert Corporation

April 2011 - (Free Research)
Uninterruptible Power Supply (UPS) terminology is a complex subject, often made more confusing by the competing marketing claims of various manufacturers. This paper explains this terminology and discusses the capabilities and limitations of the various classifications. 
(WHITE PAPER) READ ABSTRACT |

Economizer Modes of Data Center Cooling Systems by APC by Schneider Electric

July 2012 - (Free Research)
Access this white paper to learn how your data center can reduce energy costs by using the right economizer mode. This resource provides definitions for the various types of economizer modes and compares their performance against key data center attributes. 
(WHITE PAPER) READ ABSTRACT |

Networking Basics: What You Need to Know by Cisco Systems, Inc.

October 2008 - (Free Research)
When looking at networking basics, understanding the way a network operates is the first step to understanding routing and switching. Read this white paper for more. 
(WHITE PAPER) READ ABSTRACT |

Backup and Recovery: The Benefits of Multiple De-duplication Policies by Quantum Corporation

October 2008 - (Free Research)
This white paper explains the differences between the de-duplication approaches, discusses the strengths and limitations of each, shows how different backup tasks are likely to benefit from them, and talks about the business benefits. 
(WHITE PAPER) READ ABSTRACT |

Lumension Endpoint Management and Security Suite by Lumension

September 2010 - (Free Research)
A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority. 
(TRIAL SOFTWARE)

Computer Weekly – 20 May 2014: The future of networks by ComputerWeekly.com

May 2014 - (Free Research)
In this week's Computer Weekly, we look how IT and networking departments are addressing demand for apps, bandwidth and services. Virtualisation technology is being used to consolidate multiple network equipment types onto industry-standard high-volume servers, switches and storage. 
(EZINE) READ ABSTRACT |

Expert Advice for Making the Move From Unix to Linux by Red Hat and HP

February 2011 - (Free Research)
Once you know how to make a business case for migration, learn how to train your Unix staff to manage Linux environments. Find out about key differences between the two operating systems and provide your team with tactics for optimal backup and performance monitoring. 
(EGUIDE) READ ABSTRACT |

The Power of Collaboration within Unified Communications by Polycom, Inc.

June 2009 - (Free Research)
This white paper shares practical perspectives on preparing a business case for collaboration tools within Unified Communications, as well as offering best practice approaches for ensuring the successful adoption - and maximum contribution - of collaboration applications in your enterprise. 
(WHITE PAPER) READ ABSTRACT |

Realizing the Economic Benefits of Oracle Enterprise Manager Ops Center by Oracle Corporation

March 2011 - (Free Research)
This paper examines areas of potential optimization, shows how day-to-day IT management processes can contribute to – rather than detracts from – that optimization, and provides an ROI analysis with an example scenario based on actual deployments. 
(WHITE PAPER) READ ABSTRACT |

Desktop Management: Getting It Right by CA Technologies.

September 2008 - (Free Research)
Effective Desktop Management begins with knowing what you have to manage. 
(WHITE PAPER) READ ABSTRACT |

Overview Of Near Field Communication by ComputerWeekly.com

August 2013 - (Free Research)
This chapter from the book NFC Application Development for Android, offers an overview of NFC for Android developers. 
(BOOK) READ ABSTRACT |

How to configure Mac OS X Server by ComputerWeekly.com

March 2013 - (Free Research)
This step by step guide shows you how to configure Max OS X Server. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Computer Weekly 20 September 2011: Download the new issue of the UK's leading technology publication, featuring in-depth analysis of the latest IT news and technology trends by ComputerWeekly.com

September 2011 - (Free Research)
In this week's Computer Weekly, we examine what reform of the UK's banks will mean for financial services IT strategies. We also look at the problems of software licensing when moving to desktop virtualisation, discuss how to make sense of cloud computing, and provide part three of our guide to business intelligence. Download the new issue now. 
(EZINE)

Operating the Cloud with Confidence by HP & Intel®

November 2013 - (Free Research)
This whitepaper looks at ways to maintain your own standards and SLAs across the multiple vendors you may need when developing your private cloud. 
(WHITE PAPER) READ ABSTRACT |

Fighting Rootkits: Protecting against stealthy malware by flying under the operating system by Intel

January 2012 - (Free Research)
Discover why rootkits are so harmful to your organization and uncover the innovative and dramatically different approach you should take to protect your organization from these harmful intruders. 
(WHITE PAPER) READ ABSTRACT |

Core IMPACT Essential by Core Security Technologies

January 2009 - (Free Research)
How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help. 
(PRODUCT DEMO) READ ABSTRACT |

Proven Practices for Upgrading and Migrating to SharePoint Server 2010 by AvePoint, Inc.

February 2011 - (Free Research)
This paper discusses the requirements necessary for deploying SharePoint Server 2010,the different methods available for migration, key considerations for each, as well as proven practices,available tools to help make the move to Microsoft’s latest platform release with minimal businessdisruption. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 454 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts