Graphics Peripherals Research
-
Presentation Transcript: How to Cut Your Primary Storage Costs in Half
Sponsored by: Ocarina NetworksIn this paper Marc Staimer presents one of the biggest issues decision makers tasked with managing storage budgets that aren't growing at the same rate as their data.
-
Red Hat and Intel: Moving Intelligence Forward
Sponsored by: Red Hat and JBossPut state-of-the-art intelligence to work on the challenges of tomorrow by running Red Hat Enterprise Linux on the latest Intel® Xeon® processors. Red Hat's open source, commercial-strength innovation delivers optimized results for performance, energy efficiency, and advanced virtualization on Intel platforms, all at an affordable price.
-
Small Business Firewall Software Vs. Hardware Firewalls
Sponsored by: Cisco Systems, Inc.Small business firewall software and hardware firewalls are the methods used to protect computers against hacker attacks and other Internet threats.
-
Support PCI Security Compliance with Enhanced Solutions from IBM
Sponsored by: IBMThis white paper briefly describes PCI requirements, the benefits of compliance and the penalties for noncompliance.
-
System Recovery-Breaking through the Dissimilar Hardware Restore Challenge
Sponsored by: Symantec CorporationThis paper discusses how Symantec Backup Exec System Recovery Restore Anyware can dramatically change the way organizations perform a wide range of IT tasks, including bare-metal system recovery and restoration to dissimilar hardware.
-
Telephone Reliability for Alarm Notification: Where Have All the Landlines Gone?
Sponsored by: SensaphoneThis paper discusses why timely and reliable alarm notification is part of a successful remote monitoring program and discusses the factors to consider when selecting a remote monitoring system.
-
The Cost and Benefits of On-Demand Vs. On-Premise Procurement Software
Sponsored by: CoupaWhile there are dozens of procurement software solutions available, there are really only two types offered: "on-premise" procurement software and newer "ondemand" procurement software. This paper outlines an approach to compute and compare them.
-
Two Billion Entry Directory Benchmark
Sponsored by: Oracle CorporationThis benchmark evaluates Oracle Internet Directory performance under scales and throughput rates representative of those encountered in production use in both the communications industry and as part of large scale delivery architectures.
-
Unlocking the Full Power of Massive Parallelism: Solving the Network Bottleneck in MPP Databases
Sponsored by: Aster Data SystemsThis paper describes the technical limitations inherent in the architecture of traditional databases and other MPP (massive parallel processing) alternatives.
-
Uptime Software
Sponsored by: DellEMC and Intel®Learn how uptime software has improved customer service through virtualization. uptime is now able to rapidly deploy virtual machines to replicate customer environments and close support requests quickly.
-
Veeam Backup for VMware Infrastructure
Sponsored by: Veeam SoftwareVeeam Backup is the first solution that combines backup and replication in a single product for fast recovery of your VMware ESX Servers.
-
Virtualization in Education
Sponsored by: IBM Line of BusinessThis white paper discusses how virtualization technology can help connect educators and students to applications and information from almost any device.
-
Virtualization Overview
Sponsored by: Global KnowledgeThis paper explains an approach to virtualization software that relies on the host operating system to provide the service to talk directly to the underlying hardware.
-
Virtualizing the Client PC: A Proof of Concept
Sponsored by: Intel CorporationIn this paper Intel IT explores a proof of concept study that examined the viability of abstracting the client operating system from the hardware platform using virtualization.
-
Vizion Core vReplicator
Sponsored by: Vizioncore Inc.vReplicator is the recognized host-level image replication solution for VMware Infrastructure. vReplicator allows the entire virtual machine to be replicated, including the OS, configurations and patches, applications and data.