Data Converter IC White Papers

(View All Report Types)
Best Practices for Implementing a Data Warehouse on Oracle Exadata Database Machine
sponsored by Oracle Corporation
WHITE PAPER: By using the Oracle Exadata Database Machine as a data warehouse platform you have a balanced, high performance hardware configuration. This paper focuses on the other two corner stones, data modeling and data loading, providing a set of best practices and examples for deploying a data warehouse on the Oracle Exadata Database Machine.
Posted: 25 Apr 2011 | Published: 30 Nov 2010

Oracle Corporation

Intel® Xeon® Processor 5500 Series: An Intelligent Approach to IT Challenges
sponsored by Hewlett Packard Company and Intel
WHITE PAPER: As data centers reach the upper limits of their power and cooling capacity, efficiency has become the focus of extending the life of existing data centers and designing new ones. As part of these efforts, IT needs to refresh existing infrastructure with servers that deliver more performance and scalability, more efficiently. Read on to learn more.
Posted: 08 Jul 2009 | Published: 08 Jul 2009

Hewlett Packard Company and Intel

The Cost and Benefits of On-Demand Vs. On-Premise Procurement Software
sponsored by Coupa
WHITE PAPER: While there are dozens of procurement software solutions available, there are really only two types offered: "on-premise" procurement software and newer "ondemand" procurement software. This paper outlines an approach to compute and compare them.
Posted: 10 Sep 2008 | Published: 10 Sep 2008

Coupa

Improve Data Center Efficiency with Enterprise Linux Servers
sponsored by SUSE
WHITE PAPER: IT budgets are not expected to recover anytime soon, so companies need to adjust to the reality of using fewer resources to deliver business services. This white paper explains how you can accomplish this seemingly impossible objective by running your critical workloads on Linux.
Posted: 19 Jun 2012 | Published: 01 Mar 2012

SUSE

Enterprise Solution Design for SAP HANA
sponsored by HP & Intel®
WHITE PAPER: In this resource, explore the three principles of great enterprise design—stability, scalability, and agility—and learn how to apply them to your SAP landscape with a focus on SAP HANA. Read on for best practices and key design considerations for implementing your SAP HANA enterprise-level solution.
Posted: 25 Sep 2013 | Published: 28 Feb 2013

HP & Intel®

Extending Your Data Center Affordably – Empowering the Remote or Branch Office with Simplicity
sponsored by Dell India
WHITE PAPER: Check out this game-changing white paper to find out how the Dell VRTX can fuel your remote offices and eliminate common challenges, at a price you can afford.
Posted: 24 Feb 2014 | Published: 31 Dec 2013

Dell India

Small Business Firewall Software Vs. Hardware Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small business firewall software and hardware firewalls are the methods used to protect computers against hacker attacks and other Internet threats.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Cisco Systems, Inc.

Dell PowerVault MD3000 1000 Mailbox Local Continuous Replication Microsoft Exchange 2007 Storage Solution
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper describes a tested and validated storage solution for a 1000 mailbox Exchange Server 2007 environment with Local Continuous Replication (LCR) feature.
Posted: 27 Aug 2008 | Published: 27 Aug 2008

DellEMC and Intel®

Running SAP NetWeaver on the Oracle Exalogic Elastic Cloud: An Architectural Overview
sponsored by Oracle Corporation
WHITE PAPER: This white paper underscores the importance of a cohesive SAP infrastructure. Explore a recommended architecture and the process involved in implementing it.
Posted: 02 Aug 2012 | Published: 01 Sep 2011

Oracle Corporation

IT Security: Built-In Protection with Intel vPro Technology
sponsored by Intel
WHITE PAPER: New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.
Posted: 12 Jun 2012 | Published: 01 May 2012

Intel