Fibre Channel over IP Reports

Focus: Network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 08 Feb 2021 | Published: 24 Apr 2017

TechTarget ComputerWeekly.com

Why SAS Matters - Cost Effective Performance with Serial Attached SCSI (SAS) Technology from Hitachi
sponsored by Hitachi Vantara
WHITE PAPER: Serial Attached SCSI (SAS) is replacing Fibre Channel drives in high performance applications such as online transaction processing, real time analytics & streaming media. The key reasons for this transition are that SAS drives have the same or better reliability and data availability characteristics of Fibre Channel drives but are less expensive.
Posted: 25 Jan 2010 | Published: 01 Dec 2009

Hitachi Vantara

Transforming the Learning Society in Hong Kong
sponsored by Cisco Systems, Inc.
CASE STUDY: This case study describes the approach one company implemented to deploy, monitor, and maintain a growing number of physical servers. Learn how it addressed their top business challenges and find out what efficiency and flexibility benefits they were able to realize.
Posted: 06 Jun 2011 | Published: 06 Jun 2011

Cisco Systems, Inc.

What to Look for in Secure Sockets Layer
sponsored by TechTarget Security
EBOOK: This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
Posted: 04 May 2016 | Published: 04 May 2016

TechTarget Security

Choosing the Best Virtual Server Storage: A Tutorial
sponsored by VMware, Inc.
EGUIDE: If you're a small to medium-sized business, you need your storage platform to be manageable by a small IT staff and fit within your budget. This expert E-Guide provides a detailed tutorial to help you navigate the virtual storage marketplace and select the best architecture for you.
Posted: 23 Jan 2013 | Published: 23 Jan 2013

VMware, Inc.

How to Save Time and Money Making Your Transition to IPv6
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper discusses 9 strategies that can save your business time and money while transitioning to IPv6, by slowing the need for replacements and mitigating risks.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Cisco Systems, Inc.

FalconStor Continuous Data Protector
sponsored by FalconStor Software
PRODUCT OVERVIEW: Enter the HP Solutions Demo portal for an interactive flash demo and overview on FalconStor CDP with HP Solutions.
Posted: 02 Apr 2009 | Published: 02 Apr 2009

FalconStor Software

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

HP StorageWorks 4400 Enterprise Virtual Array (EVA4400) Performance
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this white paper learn how sequential performance provides customers with improved data transfer rates for applications such as data warehousing, streaming video, high-performance technical computing, and backups and restores.
Posted: 07 Aug 2008 | Published: 01 Aug 2008

Hewlett Packard Enterprise

A Computer Weekly buyer’s guide to perimeterless network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

TechTarget ComputerWeekly.com