WHITE PAPER:
As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
WHITE PAPER:
This paper discusses why timely and reliable alarm notification is part of a successful remote monitoring program and discusses the factors to consider when selecting a remote monitoring system.
WHITE PAPER:
In this paper Intel IT explores a proof of concept study that examined the viability of abstracting the client operating system from the hardware platform using virtualization.
WHITE PAPER:
This paper describes the technical limitations inherent in the architecture of traditional databases and other MPP (massive parallel processing) alternatives.
WHITE PAPER:
This white paper describes a tested and validated storage solution for a 1000 mailbox Exchange Server 2007 environment with Local Continuous Replication (LCR) feature.
WHITE PAPER:
This white paper describes a tested and validated storage solution for a 3000 mailbox Exchange 2007 environment with Single Copy Cluster in a high availability clustering mechanism based on the Microsoft Cluster Service shared storage.
WHITE PAPER:
As data centers reach the upper limits of their power and cooling capacity, efficiency has become the focus of extending the life of existing data centers and designing new ones. As part of these efforts, IT needs to refresh existing infrastructure with servers that deliver more performance and scalability, more efficiently. Read on to learn more.
WHITE PAPER:
This white paper discusses how virtualization technology can help connect educators and students to applications and information from almost any device.
WHITE PAPER:
This paper provides the data needed to understand the options and the limitations for implementing remote replication solutions on a clustered HP server and storage area network (SAN)-based storage infrastructure.
WHITE PAPER:
Small business firewall software and hardware firewalls are the methods used to protect computers against hacker attacks and other Internet threats.