Sort results by: Published date | Company name

HP ProLiant G7 Platforms based on the AMD Opteron™ 6100 Series processors for High Performance Computing [ Source: AMD ]
March 2011- This paper highlights the new architectural features and performance of the AMD Opteron™ 6100 Series processor based HP ProLiant G7 Servers. It focuses on the value to the end user when applied to High Performance Computing (HPC) solutions.

[WHITE PAPER]
Read Abstract | Go to White Paper

Working With Attachment Data Type in Microsoft Access 2007 [ Source: ASPAlliance ]
January 2008- In MS Access 2007 Microsoft has introduced a new data type called attachments. Many types of files can be stored in a column which has the attachment data type. Someone can add bitmap files, jpg files, sound files, word documents, etc. to a column without increasing the size of the database. This white paper from ASPAlliance shows an example of creating a table with a column which has the new data type, attachments.

[WHITE PAPER]
Read Abstract | Go to White Paper

Moving an MS Access Database Application to the Web with Alpha Five Version 9 [ Source: Alpha Software ]
February 2009- Alpha Software’s latest white paper details how businesses can smoothly transition their Microsoft Access database applications to the Web using Alpha Five Version 9. Alpha Five is an all-in-one integrated tool that allows users to build secure and highly customized database applications with full reporting for the desktop or the Web quickly and easily.

[WHITE PAPER]
Read Abstract | Go to White Paper

Mitigating Fraud with the ArcSight SIEM Platform [ Source: ArcSight ]
September 2008- Detecting, investigating and responding to fraudulent transactions from within and outside an organization is an essential function of business operations. This is the case for virtually any organization that requires Web, Web services and non-Web applications to run its business.

Unfortunately, most organizations have inadequate solutions in place to deter fraudsters and lack the support tools for fraud investigators to quickly identify fraud and respond to the threats effectively.

This white ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Increasing Security And FSA Compliance With A 360-Degree View Of User Activity [ Source: ArcSight ]
October 2008- This Whitepaper highlights the technology necessary to address Financial Services Authority (FSA) compliance requirements. The FSA regulates the financial services industry in the UK. Their objectives are to:
•   Maintain confidence in the financial system
•   Promote public understanding of the financial system
•   Secure the appropriate degree of protection for consumers
•   Reduce the extent to which it is possible for a business to be used for a purpose connected with financial crime
<...

[WHITE PAPER]
Read Abstract | Go to White Paper

Why Cloud and How to Choose a Cloud Vendor [ Source: Autonomy ]
December 2011- The demand for data storage is exploding, which is driving up costs, amplifying the risks of data loss or exposure, and complicating plans for disaster recovery. To cope with this exploding demand, organizations are turning to cloud-based storage for relief. The adoption of cloud solutions is growing,with a nearly 40 percent expansion in the use of third-party cloud storage for offsite copies expected by 2012.

Organizations are finding cloud-based data protection to be especially ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Survey: All's Not Well at Endpoints [ Source: Autonomy ]
December 2011- With compliance requirements and external threats on the rise, no business can afford to leave its data unprotected, especially at the endpoint. Fortunately, IT leaders understand the risk: Fifty-nine percent of recent IDG survey respondents rate backup and protection of desktop and laptop data as crucial or high priority.

Unfortunately, even though the majority of survey respondents have something in place, many fall short in terms of meeting needs for identification, classification and ...

[WHITE PAPER]
Read Abstract | Go to White Paper

How to Measure the ROI of Cloud Data Protection [ Source: Autonomy ]
December 2011- This white paper helps managers demonstrate the profitability of reducing operational costs in server backup and recovery through investment in cloud server data protection (subscription), rather than traditional backup methods. Comparative cost categories used in calculating this ROI are summarized in a convenient checklist. These include capital costs of hardware and software as well as ongoing monthly costs for maintenance, media, labor, and offsite storage of backup data.

[WHITE PAPER]
Read Abstract | Go to White Paper

Why Cloud Backup: Top 10 Reasons [ Source: Autonomy ]
December 2011- Cloud server backup solutions reduce the burden of tape management and backup operations headaches by automatically storing the data safely offsite to protect for disaster recovery purposes.

This white paper discusses the top ten reasons why organizations are turning to cloud server backup today.

[WHITE PAPER]
Read Abstract | Go to White Paper

Ready Your Infrastructure for the Cloud [ Source: Avocent ]
July 2011- We have all heard the incredible predictions for and forecasted adoption rates of cloud computing:
• IDC estimates the market for cloud products and services growing to $56B by 2014.
• Gartner more optimistically estimates the cloud market at $150B by 2013.
• AMI's research estimates that SMB cloud spending alone will reach $100B by 2014.

Is this hype or has the cloud arrived? Before we can answer that question, we will need ...

[WHITE PAPER]
Read Abstract | Go to White Paper
View All