Architectures White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

SEARCH the Research Library: WHAT'S POPULAR
IT Management  >  


MORE SPECIFIC TOPICS:  Business Architectures |  Component-based Architectures |  Darwin Information Typing Architecture |  Data Warehouse Architectures |  Database Architectures |  Infiniband Architecture |  Logical Partitions |  Network Architectures |  Processor Architectures |  Security Architectures |  Software Architectures |  Storage Architectures
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 106 Matches
Why All Enterprise Data Integration Products Are Not Equal
sponsored by Talend
White Paper: | Posted: 18 Jul 2014
Published:18 Jul 2014
Summary:In this white paper, discover several data integration challenges and the choices involved in a tool selection.
Get This Now

Accessing Your Cloud Risk - Expert Webcast
sponsored by Sophos, Inc.
Webcast: | Posted: 18 Jul 2014
Premiered:Jul 10, 2014
Summary:This webcast explains the best ways to assess your cloud risk and if it is a good fit for your organization.
Get This Now
Sophos, Inc.

Architecting for the Cloud: Best Practices
sponsored by Amazon Web Services
White Paper: | Posted: 18 Jul 2014
Published:30 Jan 2011
Summary:This paper focuses in on concepts, principles and best practices in creating new cloud applications or migrating existing apps to the cloud. Discover how elasticity and other concepts have emerged due to the cloud's dynamic nature.
Get This Now

How to Implement Next Generation Architecture
sponsored by CA ARCserve
White Paper: | Posted: 30 Jun 2014
Published:30 Jun 2014
Summary:This white paper explains trends and challenges that customers may have when facing issues with data protection.
Get This Now
CA ARCserve

Data protection, privacy and the IT department
sponsored by
Presentation: | Posted: 06 Jun 2014
Published:06 Jun 2014
Summary:Mike Cope, IT Director, University College London, looks at the data protection challenges faced by the university in this PowerPoint presentation.
Get This Now

Elliptic curve cryptography in transport ticketing
sponsored by
Essential Guide: | Posted: 30 May 2014
Published:30 May 2014
Summary:This article in our Royal Holloway Security Series looks at how elliptic curve cryptography on transport payment cards improves transaction times.
Get This Now

Develop Your Criteria for Selecting VDI Software
sponsored by
eBook: | Posted: 22 Apr 2014
Published:22 Apr 2014
Summary:Vendors provide many desktop virtualization choices, so know your needs when comparing virtual desktop infrastructure products. See how to evaluate and deploy VDI software.
Get This Now

What It Takes to Make Zero Clients Add Up
sponsored by
eBook: | Posted: 15 Apr 2014
Published:15 Apr 2014
Summary:Chapter 2 looks at the major considerations in making a final decision on whether to move an organization's desktops to zero clients. Cost, return on investment, and vendor choice are among the most essential factors to be weighed. The chapter also discusses the complexity of a shift to a zero client model.
Get This Now

Application Modernization: Best practices and methods
sponsored by TechTarget
Resource: | Posted: 18 Mar 2014
Published:18 Mar 2014
Summary:As the business landscape continues to grow unabated, you may want to consider a new approach to modernizing your legacy apps. Take this brief survey and gain access to an essential guide that uncovers what you need to know before upgrading your major applications as well as how a service approach can support application modernization.
Get This Now

Redwood Cabling Design Guide
sponsored by CommScope
eGuide: | Posted: 13 May 2014
Published:13 May 2014
Summary:Explore this informative resource to learn of several different ways to design and architect cabling for your lighting network.
Get This Now

Next Generation Data Center Infrastructure Management
sponsored by Emerson
White Paper: | Posted: 16 Dec 2013
Published:20 May 2013
Summary:Due to recent technological advances such as cloud, virtualization, big data and converged infrastructures, the data center is evolving. Read through this informational white paper to learn how companies are focusing their resources their data center infrastructure management solutions.
Get This Now

Mobilizing Windows Applications
sponsored by Citrix
White Paper: | Posted: 28 Aug 2013
Published:28 Aug 2013
Summary:Read this whitepaper to discover a solution architecture that allows for the efficient delivery of Windows-based applications.
Get This Now

HP Client Virtualization SMB Reference Architecture for Citrix VDI-in-a-Box
sponsored by Citrix and HP
White Paper: | Posted: 27 Aug 2013
Published:27 Aug 2013
Summary:This document describes a reference architecture designed to help a channel reseller or customer construct a simple virtual desktop infrastructure (VDI) configuration that can remove the guesswork from sizing and deploying VDI.
Get This Now
Citrix and HP

Top 10 Attributes of an Effective Backup Appliance
sponsored by EMC Corporation
White Paper: | Posted: 29 Jul 2013
Published:31 Mar 2013
Summary:Look no further for a deduplication storage system to consolidate your backup and archiving data and revolutionize disaster recovery. The EMC Data Domain is the industry's best defense against data integrity issues.
Get This Now
EMC Corporation

Tips for an effective document records management strategy
sponsored by Arrow and HP
eGuide: | Posted: 22 Feb 2013
Published:22 Feb 2013
Summary:This expert E-Guide outlines three steps you can take to achieve a broad view when setting up your records management policy and automated procedures. Also inside, count down four factors that inform an effective strategy for document management tools – read on to learn more.
Get This Now
Arrow and HP

1 - 15 of 106 Matches

Library Home | Advertise with Us | Partner with Us
Powered by Bitpipe
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.