White ComputersWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: White Computers returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Business Intelligence Solutions
 •   Virtualization
 •   Data Center Management
 •   Disk-based Backup & Storage/ RAID
 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Enterprise Systems Management
 •   Disaster Recovery
 •   Endpoint Security

Related Searches
 •   Collection White
 •   Conversion White
 •   Directories White Computers
 •   Information White Computers
 •   Issues White Computers
 •   Tool White Computers
 •   White Computers Cases
 •   White Computers Events
 •   White Computers Improve
 •   White Risk
Advertisement

ALL RESULTS
1 - 25 of 496 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

The Innovation Barrier, Part 2: Symptoms, Solutions, and the Impact on Equipment Manufacturers by Fanfare

November 16, 2007 - (Free Research)
This paper is the second in a two-part series exploring the innovation barrier – the point at which testing can no longer keep pace with development in the equipment manufacturing industry. It examines the innovation barrier’s symptoms – from slowdowns in development to mounting quality issues – and the potential impact on equipment manufacturers. 
(WHITE PAPER) READ ABSTRACT |

Future Proofing Your Mobile Computers: How the Features You Select Now Can Protect & Extend Your Investment Years into the Future by Intermec

May 12, 2011 - (Free Research)
This white paper explains how the features and options available for ruggedized mobile computers used in warehousing and distribution can extend the time they can perform in warehouses and distribution centers. It also provides guidance on how to make decisions that will protect your investments by meeting user needs today and into the future. 
(WHITE PAPER) READ ABSTRACT |

Monitoring the Computer Room's Physical Environment by Sensaphone

April 2008 - (Free Research)
This paper addresses the greatest environmental threats to the functionality of small to medium computer rooms and presents the time and cost savings associated with the integration of a remote monitoring system. 
(WHITE PAPER) READ ABSTRACT |

Client Management Best Practices for Managing Mac Systems by CDW

April 2010 - (Free Research)
One of the greatest challenges facing any institution is the maintenance of a large number of computer systems. When properly performed, lifecycle management—from the loading dock to the recycler—maximizes your return on investment, keeps your users more productive, and protects the security of your computer systems and your enterprise data. 
(WHITE PAPER) READ ABSTRACT |

HP Data Protector Software Advanced Backup to Disk Integration with Virtual Tape Libraries White Paper by Hewlett-Packard Company

December 2008 - (Free Research)
This white paper provides a better understanding of the integration of HP Data Protector Software with Virtual Tape Libraries by utilizing the Advanced Backup to Disk functionality available with the HP Data Protector Software. 
(WHITE PAPER) READ ABSTRACT |

Social Engineering: Hacking People, Not Machines by AVG Technologies USA, Inc.

March 2010 - (Free Research)
Hackers are often portrayed as technical geniuses plying their trade through the use of complex computer code. But gaining access to a computer can be as simple as fooling someone into a revealing a password. Read this paper to learn more about social engineering threats and how to defend against them. 
(WHITE PAPER) READ ABSTRACT |

The OSI Model: Understanding the Seven Layers of Computer Networks by Global Knowledge

July 2006 - (Free Research)
This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking. 
(WHITE PAPER) READ ABSTRACT |

Citrix GoToMyPCCorporate - Security White Paper by Citrix Online - GotoMyPC

June 2008 - (Free Research)
In this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control. 
(WHITE PAPER) READ ABSTRACT |

Improve Your Business through Best Practice IT Management by Kaseya

April 2008 - (Free Research)
This white paper provides insight on ways that MSPs and IT departments can improve their management of services. Learn how using ITIL best practices with an automated management solution can address a number of the unique challenges these businesses face. 
(WHITE PAPER) READ ABSTRACT |

The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc.

March 2008 - (Free Research)
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits and limitations of these technologies as well as the best use cases for each... 
(ANALYST REPORT) READ ABSTRACT |

Virtualization in Education by IBM Line of Business

June 2008 - (Free Research)
This white paper discusses how virtualization technology can help connect educators and students to applications and information from almost any device. 
(WHITE PAPER)

The Cybercrime Arms Race by Kaspersky Lab

February 2008 - (Free Research)
Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them. 
(WHITE PAPER) READ ABSTRACT |

True Enterprise-Quality Linux Support: Edison Group White Paper by Oracle Corporation

November 2008 - (Free Research)
This white paper discovers how organization can increase operational efficiency while cutting costs with Oracle Unbreakable Linux, a support program that delivers enterprise-quality support for Linux at a lower cost. 
(WHITE PAPER) READ ABSTRACT |

Disk Assisted Back-Up White Paper: Backup to Disk and How to Implement It with HP Data Protector by Hewlett-Packard Company

September 2006 - (Free Research)
Advancements in technology and price reductions have recently made it possible to use disk together with tape to improve data protection. This white paper discusses the benefits of this technology. 
(WHITE PAPER) READ ABSTRACT |

How White Papers Can Boost Your Lead Gen Campaigns by KnowledgeStorm Webinars (E-mail this company)

October 2006 - (Free Research)
In this presentation document, white paper guru Michael Stelzner, author of "Writing White Papers: How to Capture Readers and Keep Them Engaged," will share his secrets on creating effective white papers that attract prospects in droves. 
(ANALYST REPORT) READ ABSTRACT |

How White Papers Can Turbo-Boost Your Lead Gen Campaigns by KnowledgeStorm Webinars (E-mail this company)

September 2006 - (Free Research)
In this upcoming Webcast, "How White Papers Can Turbo-Boost Your Lead Gen Campaigns", white paper guru Michael Stelzner, author of "Writing White Papers: How to Capture Readers and Keep Them Engaged," will share his secrets on creating white papers that attract prospects in droves. This Webcast is presented by KnowledgeStorm. 
(WEBCAST) READ ABSTRACT |

Podcast - Eight Rules for Creating Great White Papers by KnowledgeStorm, Inc (E-mail this company)

March 2006 - (Free Research)
White papers are one of the most misunderstood, miswritten and misused marketing tools available. While many companies think they need a white paper, few manage to write, design or use them to their full potential. This podcast outlines eight key steps to take when writing a white paper and what you should do once the paper is written. 
(PODCAST) READ ABSTRACT |

Eight Rules for Creating Great White Papers by KnowledgeStorm, Inc (E-mail this company)

May 2005 - (Free Research)
White papers are one of the most misunderstood, miswritten and misused marketing tools available. While many companies think they need a white paper, few manage to write, design or use them to their full potential. This paper outlines eight key steps to take when writing a white paper and what you should do once the paper is written. 
(WHITE PAPER) READ ABSTRACT |

Building a Secure and Compliant Windows Desktop by BeyondTrust Corporation

May 2008 - (Free Research)
Removing administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights. 
(WHITE PAPER) READ ABSTRACT |

White Paper: Controlling Recreational Peer-to-Peer Traffic to Improve Application Performance by Exinda Networks

April 2008 - (Free Research)
This white paper provides a practical overview on the evolution of recreational P2P traffic, how it is impacting corporate networks and, offers specific recommendations for controlling these recreational applications. 
(WHITE PAPER) READ ABSTRACT |

Beyond Virtual Tape Libraries: End-to-End Data Protection with Syncsort Disk-to-Disk Solutions by Syncsort

January 2007 - (Free Research)
While VTL data storage has been a popular data protection solution in recent years, the VTL solution may be incomplete for long-term needs. Read this white paper to learn why D2D backup solutions are the ideal data protection technologies for y... 
(WHITE PAPER) READ ABSTRACT |

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation by iovation, Inc.

June 2009 - (Free Research)
This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process. 
(WHITE PAPER) READ ABSTRACT |

Malicious Code Detection Technologies by Kaspersky Lab

February 2008 - (Free Research)
This white paper provides an overview of the evolving combat tactics used in the antivirus battle, giving both simplified explanations of technological approaches as well as a broad chronological perspective. 
(WHITE PAPER) READ ABSTRACT |

Intrusion Defense Firewall: Network-Level HIPS at the Endpoint by Trend Micro, Inc.

July 2010 - (Free Research)
This white paper examines a blended approach to host intrusion defense in search optimal security combined with an ideal balance between flexibility, control, and ease of management. Specific examples highlight the benefits and pitfalls of the many different filtering techniques. 
(WHITE PAPER) READ ABSTRACT |

Managing PST Files from Discovery to the Archive - Free White Paper by C2C Systems (UK)

February 2008 - (Free Research)
This white paper outlines some ideas, methods and applications for living with legacy .PST files and avoiding the creation of new ones. It will help you: -Assess the true facts about .PST files -Manage existing .PST files -Avoid the need for .PST 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 496 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts