Pointers White Papers

(View All Report Types)
The Power of Mobile Peripherals
sponsored by BlackBerry
WHITE PAPER: This white paper discusses how mobile peripherals help extend the value of BlackBerry solutions such as automate data collection, improve accuracy, and lower costs, among other benefits.
Posted: 18 Feb 2010 | Published: 18 Feb 2010

BlackBerry

Advanced RFID Measurements: Basic Theory to Protocol Conformance Test
sponsored by National Instruments
WHITE PAPER: As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
Posted: 21 Jul 2008 | Published: 01 Jan 2006

National Instruments

A New Dimension in IT Infrastructure Management
sponsored by Raritan Inc.
WHITE PAPER: This white paper describes how KVM technology can improve system reliability, manageability, and security, resulting in lower TCO and less downtime.
Posted: 18 Jan 2008 | Published: 01 Sep 2004

Raritan Inc.

DVS Enterprise - Active System 800v with VMware Horizon View 5.2: Reference Architecture
sponsored by Dell and VMware
WHITE PAPER: This exclusive paper examines a converged infrastructure solution that's designed specifically for desktop virtualization – and that is pre-configured to meet your organization's specific requirements and ready to integrate into your data center.
Posted: 13 Jun 2013 | Published: 13 Jun 2013

Dell and VMware

Imaging a Latitude 10 on Windows 8 with System Center Configuration Manager
sponsored by DellEMC and Intel®
WHITE PAPER: Check out this exclusive white paper for directions on how to create a Windows 8 image for the Latitude 10, as well as the information you need to image a Latitude 10 in your enterprise environment.
Posted: 07 Mar 2014 | Published: 31 Dec 2010

DellEMC and Intel®

Enterprise Solution Design for SAP HANA
sponsored by HP & Intel®
WHITE PAPER: In this resource, explore the three principles of great enterprise design—stability, scalability, and agility—and learn how to apply them to your SAP landscape with a focus on SAP HANA. Read on for best practices and key design considerations for implementing your SAP HANA enterprise-level solution.
Posted: 25 Sep 2013 | Published: 28 Feb 2013

HP & Intel®

A reference architecture for a leading solution
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper explores the reference architecture for a leading server solution. Learn how this architecture is designed to influence the benefits of virtualizing the underlying infrastructure and address the common problems associated with hardware sprawl.
Posted: 21 Oct 2014 | Published: 30 Sep 2014

DellEMC and Intel®

Remote Office Infrastructure – A Microsoft Hyper-V Server 2012 Reference Architecture on Dell PowerEdge VRTX
sponsored by Dell India
WHITE PAPER: Access this in-depth resource to find out how this converged hardware solution can help you design your branch office IT environment.
Posted: 18 Feb 2014 | Published: 30 Jun 2013

Dell India

IT Security: Built-In Protection with Intel vPro Technology
sponsored by Intel
WHITE PAPER: New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.
Posted: 12 Jun 2012 | Published: 01 May 2012

Intel

Cloud Disaster Recovery: Practical Applications and Pointers for the SMB
sponsored by Symantec Corporation
EGUIDE: This expert guide from SearchStorage.com discusses how cloud-based services can simplify and streamline your disaster recovery and outlines key phases of the DR planning process.
Posted: 24 May 2013 | Published: 24 May 2013

Symantec Corporation

Identifying the Hidden Risk of Data De-duplication: How the HYDRAstor Solution Proactively Solves the Problem
sponsored by NEC Corporation of America
WHITE PAPER: Data de-duplication has recently gained significant industry attention, especially for disk-based backup products.
Posted: 07 Jan 2008 | Published: 01 Jan 2007

NEC Corporation of America

SharePoint E-Zine Volume 15: Top Five SharePoint Challenges and Solutions
sponsored by TechTarget Search Windows Server
EZINE: Having some issues with SharePoint? It happens. This issue describes some of SharePoint's most common problems and provides the fixes to solve them. Also in this issue, get some pointers on how to manage external data access as part of your governance plan, and weigh the pros and cons of SharePoint social computing.
Posted: 20 Oct 2009 | Published: 20 Oct 2009

TechTarget Search Windows Server

Managing SharePoint in an Enterprise Environment
sponsored by Global Knowledge
WHITE PAPER: Microsoft Office SharePoint Server 2007 and other SharePoint technologies are excellent tools for a modern, web-based office environment. This white paper gives pointers on managing them.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Healthcare Ransomware Attack: Prevention and Backups Are Critical
sponsored by Cisco Umbrella
EGUIDE: In this e-guide, explore 6 pointers for preventing ransomware attacks according to Harun Rashid, VP of Global Health Services and CIO of Children's Hospital of Pittsburgh of UPMC.
Posted: 24 May 2017 | Published: 24 May 2017

Cisco Umbrella

Master Guide – Migrating SQL Server 2000 to SQL Server 2008
sponsored by DellEMC and Intel®
WHITE PAPER: This Deployment Guide reviews the approach that Principled Technologies and Dell recommend for migrating databases from SQL Server 2000 to SQL Server 2008.
Posted: 10 Sep 2009 | Published: 23 Apr 2008

DellEMC and Intel®

Healthcare CIOs Address Cybersecurity Vulnerabilities
sponsored by Optum
EGUIDE: As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum

Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response
sponsored by Xerox
EGUIDE: In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.
Posted: 20 Oct 2016 | Published: 19 Oct 2016

Xerox

Sharepoint E-zine Vol.3: Using SharePoint's InfoPath feature to generate forms
sponsored by TechTarget Search Windows Server
EZINE: This guide explains planning global enterprise SharePoint deployments, creating custom global search scopes in SharePoint and top tips for harnessing Microsoft SharePoint governance.
Posted: 24 Oct 2008 | Published: 23 Oct 2008

TechTarget Search Windows Server

Pulse E-zine: Vol. 2, No. 2
sponsored by TechTarget Health IT
EZINE: Access this edition of Pulse e-zine to explore the evolving mobile healthcare trend, and learn how to stay compliant for the dreaded unannounced HIPAA audits.
Posted: 07 May 2014 | Published: 07 May 2014

TechTarget Health IT

Microsoft's Suite Office: 365 Migration
sponsored by TechTarget Search Windows Server
EBOOK: This three-part guide explains how to pull off a move to Office 365 with as little difficulty as possible. Read on to learn about the potential complications and figure out the best ways to avoid downtime. Whether it is the 365 MFA function, access to cloud-hosted services, or updated office applications, this guide has you covered.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

TechTarget Search Windows Server

Journey towards Zero Defects: Challenges, Best Practices and Testing Models
sponsored by Wipro
WHITE PAPER: Organizations face different challenges at different levels of testing maturity. Testing Maturity Model (TMM) and Test Process Improvement (TPI) are two of the contemporary testing maturity models discussed in this paper.
Posted: 10 Nov 2005 | Published: 01 Nov 2005

Wipro

Balancing User Experience and Data Risks
sponsored by TechTarget CIO
EBOOK: A great user experience is the holy grail of mobile app development, but it doesn't have to be unattainable. Get tips on how to balance UX with mobile data security.
Posted: 11 Nov 2015 | Published: 11 Nov 2015

TechTarget CIO

SUN SYSTEMS FOR ORACLE COHERENCE: An optimal in-memory data grid architecture
sponsored by Sun Microsystems, Inc.
WHITE PAPER: Optimizing the benefits of a data grid built with Oracle Coherence relies upon creating a modular, balanced architecture. Matching the number of application servers, memory capacity, and quantity of processing nodes to the target workload characteristics is important to achieving the best performance.
Posted: 11 Nov 2009 | Published: 11 Nov 2009

Sun Microsystems, Inc.

Healthcare Cybersecurity Best Practices
sponsored by ServiceNow
EGUIDE: In this expert e-guide, find out what CIOs attending HIMSS 2016 had to say on how to best identify and protect against healthcare cybersecurity vulnerabilities. Plus, learn why one CIO believes network monitoring is the key to cybersecurity in healthcare.
Posted: 13 Jun 2016 | Published: 07 Jun 2016

ServiceNow

Panzura Data Services Search, View, Manage And Audit Cloudfs Files
sponsored by Panzura
PRODUCT OVERVIEW: According to a recent study, U.S. workers lose nearly 3 hours of productivity per week due to duplicated work, including recreating files that cannot be easily found. Download this product overview to learn about how Panzura Data Services can provide a centralized all-in-one viewpoint of your cloud data.
Posted: 02 Jan 2024 | Published: 03 Jan 2024

TOPICS:  .NET
Panzura

ERP Curveballs: Cost, Customization, Cloud
sponsored by TechTarget Data Management
EBOOK: To have the fastest, agile, most profitable business, companies are going to have to keep up. And Cloud ERP is just one shift to understand -- now, not tomorrow. Learn what trends to manage against and what hassles to avoid.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

TechTarget Data Management

Dedupe for Virtual Setups
sponsored by DellEMC and Intel®
PRESENTATION TRANSCRIPT: This one-page transcript of a presentation by deduplication expert Howard Marks gives an overview of the pros and cons of different dedupe processes, and delves into the type that Microsoft's Hyper-V 3.0 employs and why.
Posted: 20 Mar 2013 | Published: 20 Mar 2013

DellEMC and Intel®

What to look for in next-gen data snapshot techs
sponsored by DellEMC and Intel®
PRESENTATION TRANSCRIPT: This presentation transcript, featuring backup expert Brien Posey, takes a look at the defining characteristics of a next-generation data snapshot and how this technology fits into traditional data protection programs.
Posted: 20 Mar 2013 | Published: 20 Mar 2013

DellEMC and Intel®

Using Cyclomatic Path Analysis to Detect Security Vulnerabilities
sponsored by McCabe Software, Inc.
WHITE PAPER: The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.
Posted: 10 Nov 2010 | Published: 10 Nov 2010

McCabe Software, Inc.

Virtual currencies and their potential role in cyber crime
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.
Posted: 08 Feb 2021 | Published: 04 Aug 2016

TechTarget ComputerWeekly.com

E-Guide: Evaluating Deduplication Systems: The key considerations you don’t know about
sponsored by HP Inc
EGUIDE: In this SearchDataBackup.com E-Guide, storage expert W. Curtis Preston discusses deduplication systems, and the steps you need to take to make sure your dedupe solution is on the right side of those two extremes, while ESG Senior Analyst Lauren Whitehouse offers insight into taking a software or hardware approach to deduplication.
Posted: 10 Aug 2011 | Published: 10 Aug 2011

HP Inc

Get the Coverity Scan 2010 Open Source Integrity Report featuring the Android Integrity Report
sponsored by Coverity by Synopsys
WHITE PAPER: The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others. Read on to learn more about these results.
Posted: 27 Jan 2011 | Published: 27 Jan 2011

Coverity by Synopsys

E-Guide: Using Dedupe for Disk & Restoring Deduped Data
sponsored by ExaGrid Systems, Inc.
EGUIDE: Some storage managers are still unsure as to where and how they should be using their dedupe technology in disk backup or how to restore deduped data. This SearchDataBackup.com E-Guide can help by outlining top tips on how to use dedupe in disk-based backup and how dedupe affects the recovery process.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

ExaGrid Systems, Inc.

Violin Solution Brief Data Reduction
sponsored by Violin Memory
WHITE PAPER: This white paper explains why granular control is the best way to utilize data reduction tools deduplication and compression. Find out exactly what granular control is and how a leading product can help with data reduction.
Posted: 21 Oct 2014 | Published: 29 Aug 2014

Violin Memory