RISC Microprocessors White Papers

(View All Report Types)
Migrating From UNIX/ RISC To Red Hat Enterprise Linux® On Intel® Processor-Based Servers
sponsored by Red Hat and Intel
WHITE PAPER: Red Hat Enterprise Linux running on Intel® processor-based servers is helping companies cut TCO by up to 50 percent and more versus comparable UNIX/RISC solutions, while providing a better foundation for growth. This white paper outlines the key benefits of migration and provides a step-by-step guide to conducting a successful transition.
Posted: 10 Aug 2009 | Published: 10 Aug 2009

Red Hat and Intel

A Catalyst for Mission-Critical Transformation
sponsored by Intel
WHITE PAPER: IT organizations looking to improve service levels and drive down total costs for their most demanding workloads should take a closer look at the latest Intel® Xeon® processor 7500 series. Read this paper to learn more.
Posted: 29 Oct 2010 | Published: 05 May 2010

Intel

PowerEdge M1000e Blade Chassis
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Check out this concise white paper to find out the key features of this blade chassis that will help you construct your IT infrastructure, as well as a complete list of its technical specifications.
Posted: 19 Feb 2014 | Published: 31 Dec 2013

Dell, Inc. and Intel®

IBM PureFlex Systems with VMWare: Cloud-ready virtualization with the flexibility of an expert integrated system
sponsored by IBM
WHITE PAPER: This resource explores the benefits of combining IBM PureFlex System with VMware. Inside, discover how you can implement a reliable cloud-ready infrastructure with integrated hardware and software designed for efficient virtualization. Discover if this combination will bring the benefits your organization needs.
Posted: 15 Jul 2013 | Published: 30 Apr 2012

IBM

The System x X5 Difference IBM Innovation on Industry Standard Servers
sponsored by IBM
WHITE PAPER: This white paper shows how IBM eX5 systems allow organizations to combine the full advantages of Intel’s Xeon processors with the latest and most advanced System x features - allowing companies to do more with fewer servers and achieve better system utilization and energy efficiency.
Posted: 19 Jan 2011 | Published: 19 Jan 2011

IBM

Evolution of Integrity Checking with Intel® Trusted Execution Technology: an Intel IT Perspective
sponsored by Intel
WHITE PAPER: As part of an effort to address security concerns, Intel IT evaluated Intel® Trusted Execution Technology (Intel® TXT), a new security technology in Intel® processors. Intel TXT is a foundation technology that can be applied to enhance security in multiple usage models. Read this white paper to learn more.
Posted: 02 May 2011 | Published: 25 Mar 2011

Intel

Optimizing the Private Cloud with Intel® and Microsoft*
sponsored by Intel and Microsoft
WHITE PAPER: The Intel® Xeon® processor family provides a reliable, available, and serviceable infrastructure which works seamlessly with Windows Server 2008 R2. By leveraging the power of Intel technology, businesses can enhance their private cloud infrastructure to help IT administrators and end-users receive an efficient, secure, and simplified experience.
Posted: 16 May 2011 | Published: 29 Mar 2011

Intel and Microsoft

Best Practices for successful IP Address Management (IPAM)
sponsored by Infoblox
WHITE PAPER: This white paper discusses several ways to develop a successful IPAM strategy.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

Infoblox

PC-Disable Delivers Intelligent Client-Side Protection for Lost or Stolen Notebooks
sponsored by Absolute
WHITE PAPER: Read this white paper to learn how new hardware-based technology, could help reduce the incidence of notebook theft. The result can be better protection of assets and sensitive data on notebooks, rapid reactivation when systems are returned, and reduced business risk.
Posted: 14 Dec 2009 | Published: 14 Dec 2009

Absolute

Small Business Firewall Software Vs. Hardware Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small business firewall software and hardware firewalls are the methods used to protect computers against hacker attacks and other Internet threats.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Cisco Systems, Inc.