System Management Reports

Cisco Security Solutions - A Reference Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: This reference guide shows why security matters now more than ever. A strategic security solution empowers organizations to maintain their reputation, meet regulatory compliance standards, protect business information, and optimize business operations. Read on and discover how Cisco can help you meet those objectives.
Posted: 10 Jun 2009 | Published: 09 Jun 2009

Cisco Systems, Inc.

The New Building Blocks of Network Design
sponsored by Cisco Systems, Inc.
WHITE PAPER: This paper explores network virtualization as a strategy to make corporations more agile and IT expenditure efficient.
Posted: 26 Mar 2014 | Published: 12 Jan 2009

Cisco Systems, Inc.

BMC Software Hybrid Copy Techniques
sponsored by BMC Software, Inc.
WHITE PAPER: Because organizations are demanding 24x7 availability from their IMS, DB2®, and VSAM applications, it is imperative that those applications do not experience outages. Read this white paper to find out how BMC's Hybrid Copy techniques help for faster system recovery in the event of a local outage.
Posted: 17 Apr 2009 | Published: 17 Apr 2009

BMC Software, Inc.

Exploring IBM SOA Technology & Practice: How to Plan, Build, and Manage a Service Oriented Architecture in the Real World
sponsored by IBM
BOOK: This eBook is intended for readers who are already familiar with service oriented architecture (SOA) and who want to learn about IBM's advice on how to be successful with SOA. It is intended for IT and business professionals involved with adopting ...
Posted: 22 Oct 2007 | Published: 22 Oct 2007

IBM

Muscle in a Box
sponsored by Cray
PRESENTATION TRANSCRIPT: This presentation transcript is on the Cray CX1 personal supercomputer with ANSYS simulation software. Presenters are Barb Hutchings from ANSYS and Ian Miller from Cray. ANSYS is working with Cray on a joint solution, and the motivation today is the really huge value proposition that high performance computing brings to ANSYS customers.
Posted: 10 Jul 2009 | Published: 01 Jul 2009

Cray

Introduction to Virtualization E-Book, Chapter 2: Optimizing Server Virtualization
sponsored by Hewlett Packard Company and Intel
EBOOK: Server sprawl and underutilization problems plague many data centers, with applications being assigned to a server that rarely uses any more than 5% to 10% of its computing capacity. This e-book explains optimizing server virtualization and server management and can help optimize a virtual server deployment.
Posted: 12 Jun 2009 | Published: 19 Feb 2009

Hewlett Packard Company and Intel

Total Cost Comparison of Backup Technologies: IT Decision-Maker Perspectives on NetApp SnapVault Disk-to-Disk versus Traditional Tape-Based Backup Solutions
sponsored by NetApp
WHITE PAPER: Download this exclusive article to gain insight on why a NetApp SnapVault backup system is 54% less expensive than a similar tape-based backup solution over a typical backup product lifecycle.
Posted: 09 Jan 2009 | Published: 09 Jan 2009

NetApp

Refreshing IT Infrastructure with the Xeon Processor 5500 Series
sponsored by Intel Corporation
PODCAST: In this Podcast, learn what key points an organization looks at when thinking about a technology refresh. Gain insight into the value proposition of refreshing IT infrastructure with the Xeon Processor 5500 series and how it is essential for meeting performance, reliability and flexibility requirements
Posted: 21 May 2009 | Premiered: May 11, 2009

Intel Corporation

Quicktour Demo: Key Differentiators between Microstrategy and Hyperion
sponsored by MicroStrategy
WHITE PAPER: This tour provides an overview of MicroStrategy platform's uniquely powerful enterprise BI capabilities and illustrates the 12 key differentiators between MicroStrategy and Hyperion.
Posted: 26 Nov 2008 | Published: 26 Nov 2008

MicroStrategy

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.